How to stop public usb from hacking your phone?
When you plug into anything that can access data, such as a computer, iOS will ask you if you want to “trust” the device. If you see that alert, unplug immediately, because you are connected to something other than an innocuous charger. https://www.fastcompany.com/90431828/how-to-stop-public-usb-ports-from-hacking-your-phone?partner=rss&utm_campaign=rss+fastcompany&utm_content=rss&utm_medium=feed&utm_source=rss
德國網路安全機構發現 VLC 播放器有重大缺陷 (23/7)
https://technews.tw/2019/07/23/critical-flaw-in-vlc-media-player-discovered-by-german-cybersecurity-agency/
iOS 13 bug exposes all your saved passwords (18/7)
https://www.cultofmac.com/638868/ios-13-bug-exposes-all-your-saved-passwords/
What is post-quantum cryptography? (14/7)
The race is on to create new ways to protect data and communications from the threat posed by super-powerful quantum computers. https://www.technologyreview.com/s/613946/explainer-what-is-post-quantum-cryptography/
IT managers are struggling to keep up with cyberattacks, are u? (12/7)
A report from Sophos suggests that the attack techniques are varied and often multi-staged which makes it that much harder for security experts to keep their networks intact. Some 20 per cent of the respondents (out of 3,100 surveyed) said they didn’t know how they got breached. https://www.itproportal.com/news/it-managers-are-struggling-to-keep-up-with-cyberattacks/
全球 3 成 VPN 業者被中資掌控,網友翻牆恐被監控 (10/7)
https://technews.tw/2019/07/09/the-global-3-percent-vpn-entrepreneur-by-the-chinese-funded-control/
Microsoft Patches Zero-Day Vulnerabilities Under Active Attack (10/7)
https://www.darkreading.com/risk/microsoft-patches-zero-day-vulnerabilities-under-active-attack/d/d-id/1335197?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Europol and Eurojust team up to identify latest cybercrime trends (6/7)
https://www.neweurope.eu/article/europol-and-eurojust-team-up-to-identify-latest-cybercrime-trends/ Europol and Eurojust published on 05 July a report categorizing the current developments and challenges in combating cybercrime.The trends are divided in five categories: loss of data, loss of location, challenges associated with national legal frameworks, obstacles to international cooperation, and challenges of public-private partnerships. 將來有國家會告上國際法庭控告另一個國家黑佢電網?
[WTF] China installs spyware on tourists’ Android phones, downloads data from iPhones (5/7)
https://9to5mac.com/2019/07/03/spyware/ WTF is that?
Network Security Firm *Untangle* Launches SD-WAN Router and Micro-Firewall (4/7)
Network security company Untangle this week debuted its Network Security Framework, which includes its new micro-firewall and an SD-WAN router. That new platform also includes Untangle’s existing Linux-based next-generation firewall and its command center, which manages network traffic from a cloud-based console.Dirk Morris, founder and chief product officer at Untangle, said the framework is a “new approach to […]