Thursday, September 20, 2018

Poll:Will you be moving your data center to a

','browse.filter.document.other':'Other uploaded files','browse.filter.idea.anytime':'Anytime','browse.filter.daterange.end':'end date:','nav.bar.create.heading.announcement':'Create an announcement','ctr.choose.myctr.video.header':'Your Videos','browse.filter.document.text':'Plain text','browse.filter.participated':'Participated','browse.filter.contenttype':'Filter by content type','browse.filter.document.type':'Documents','browse.filter.project.ontrack':'On Track','nav.bar.create.heading.photoAlbum':'Create a photo album','browse.filter.user.disabled':'Include deactivated users','content.mv.remove_collab.text':'Moving this document here will remove any current collaborators.','browse.filter.pinlabel':'Set current tab as default','browse.filter.choose':'Choose a...

Google Groups Misconfiguration Exposes Corporate Data

Researchers say as many as 10,000 businesses are affected by a widespread misconfiguration in Google Groups settings.A widespread Google Groups misconfiguration is causing businesses to leak corporate data. Administrators are...

Zero-Day Flash Exploit Targeting Middle East | Threatpost

A zero-day vulnerability is being exploited in the wild in targeted attacks against Windows users in the Middle East, researchers warned Thursday. The Flash Player vulnerability (CVE-2018-5002), a stack-based buffer overflow...

EFF Sues to Repeal Controversial Online Sex Trafficking FOSTA Law | Threatpost

The Electronic Frontier Foundation on Thursday announced it is suing to invalidate a recently passed law that is meant to fight online sex trafficking. The Allow States and Victims to Fight...

Password Reuse Abounds, New Survey Shows

Despite heightened awareness of the security implications many users still continue to reuse passwords and rarely if ever change them, a LogMeIn survey shows.When it comes to the password behaviors...

Zip Slip Flaw Affects Thousands of Open-Source Projects | Threatpost

A known critical vulnerability has been given the moniker Zip Slip this week in an effort to spread awareness of its prevalence: recent analysis shows it to affect multiple open-source...

Friday Squid Blogging: Squid that Mate, Die, and Then Sink

Rhys • January 26, 2018 6:00 PM Two approaches that offer 'post-hoc verification' of quantum computations were published today. This was published (https://www.sciencedaily.com/releases/2018/01/180123112559.htm) Post-hoc verification would step up the game...

extreme hackers or extreme hoax? – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Cynicism in Cybersecurity: Confessions of a …

Anyone constantly dealing with complex computer systems teetering on the brink of disaster will likely succumb to the cult of cynicism. These four strategies will help you focus on the...

England versus Facebook – score currently stands at £500,000-nil – Naked Security

It’s the hot story right now in Europe… …no, we’re not talking about the news that France just dumped neighbours Belgium out of the World Series with a 1-0 victory. We’re...

APLICATIONS

HOT NEWS