Priority Post

You down with P2P? 10 tips to secure your mobile payment app
Jovi Umawing | | How-tos, mobile payment, p2p payment, p2p transaction, peer-to-peer, Priority Post, Privacy, security bloggers network, social payment, transaction reversal scam
Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we'll look at the security risks of using P2P ...
TLS 1.3 is nearly here
Christopher Boyd | | Internet, online, Priority Post, security bloggers network, Security world, technology, TLS, TLS 1.3, transport layer security
TLS 1.3 is nearly upon us, and with it comes a more secure way to do business online. We look at some of the changes coming into force soon. Categories: Security world ...

Take the Pledge to Prevent a Ransomware Disaster: World Backup Day 2018
Friends Don’t Let Friends Go Without a Backup. While backup is vital every day, use World Backup Day — March 31, 2018 —to urge your colleagues and friends to take the pledge ...

State of Software Security: Checking the Pulse of the Healthcare Industry
Over the past year, our scans of thousands of applications and billions of lines of code found a widespread weakness in applications, which is a top target of cyber attackers. And when ...

MyFitnessPal hacked, 150 million user accounts compromised
Luana Pascu | | Data breach, Data leak, Industry News, MyFitnessPal, Priority Post, security bloggers network, Urban Armour
American manufacturer of sports gear, Urban Armour, announced that 150 million MyFitnessPal accounts were breached following the largest cyber incident to take place so far this year. Although the nutrition application fell ...
WannaCry after one year
In the news, Boeing (an aircraft maker) has been "targeted by a WannaCry virus attack". Phrased this way, it's implausible. There are no new attacks targeting people with WannaCry. There is either ...

SecurityEverAfter 2018-03-29 21:17:00
I recently posted the below on the SANS Internet Storm Center.The CIS Controls serve as a “prioritized set of actions to protect your organization and data from known cyber attack vectors.”. Embraced ...

Critical Drupal Core Vulnerability: What You Need to Know
Drupal is popular, free and open-source content management software. On March 28, the Drupal security team released patches for CVE-2018-7600, an unauthenticated remote code execution vulnerability in Drupal core. The vulnerability affects ...

Ready for tax season phishing scams?
Health Security Solutions | | confidential, cyberthreat, data, information, Phishing, Priority Post, scam, security, security bloggers network
As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...

Security Analyst Summit 2018 in Cancun – AI, ML, And The Sun
Raffael Marty | | Artificial Intelligence, Priority Post, security bloggers network, Security Intelligence
Another year, another Security Analytics Summit. This year Kaspersky gathered an amazing set of speakers in Cancun, Mexico. I presented on AI & ML in Cyber Security – Why Algorithms Are Dangerous ...