Thursday, October 11, 2018

Google+ security flaw revealed, social network shuts down

Security Digest
Information security news and advice from TechTarget's network| October 11, 2018
TechTarget
FEATURED STORY
Google security audit begets product changes, German probe
by Michael Heller, Senior Reporter
A Google security audit uncovered a glitch in Google Plus that exposed data from nearly 500,000 accounts, causing the company to shutter the social network and spur a German data protection probe. (SearchSecurity.com)
Advertisement
NEWS
 
At (ISC)² Security Congress 2018, a congressman calls for action
Rep. Cedric Richmond (D-La.) outlined three key strategies for addressing cybersecurity policy and workforce gaps during the (ISC)² Security Congress in New Orleans. (SearchSecurity.com)
 
Palo Alto Networks buys cloud security startup RedLock
Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies. (SearchCloudSecurity.com)
 
Compromised Supermicro chips reportedly infiltrated U.S.
News roundup: A Bloomberg report claimed China infiltrated U.S. companies and government agencies through tiny Supermicro chips on motherboards. Plus, a new Telegram flaw and more. (SearchSecurity.com)
 
U.S. government domain officials to start using 2FA
The government domain registrar -- DotGov -- began rolling out two-factor authentication for officials managing .gov domains in order to mitigate against DNS hijacking. (SearchSecurity.com)
 
North Korean cybertheft of $100-plus million attributed to APT38
Security researchers tracked an aggressive cybertheft campaign -- attributed to North Korean APT38 -- in which threat actors attempted to steal more than $1 billion and destroy all evidence along the way. (SearchSecurity.com)
 
Risk & Repeat: Inside the Facebook 2FA fail
This week's Risk & Repeat podcast discusses the latest controversy for Facebook, which has been using two-factor authentication numbers for advertising purposes. (SearchSecurity.com)
EXPERT ADVICE
 
How Shodan helps identify ICS cybersecurity vulnerabilities
Shodan can be a helpful tool for security pros to locate ICS cybersecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works and how it can be used for security. (SearchSecurity.com)
 
Picking the right focus for web application security testing
Deciding which web applications on which to focus application security testing is a challenging task. Read this list of considerations to ensure you're addressing the right areas. (SearchCloudSecurity.com)
 
How to fight cloud security threats effectively
Protecting cloud data, applications and infrastructure is a critical part of any company's modern security posture. Here's the latest on cloud security issues and challenges. (SearchCloudSecurity.com)
 
How to collect open source threat intelligence in the cloud
Threat intelligence analysis can be challenging and expensive for enterprises. Expert Frank Siemons explains how open source threat intelligence can simplify the process. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

No comments: