The Threatpost editors break down the top security stories of the week ended Oct. 16, including: Patch Tuesday insanity, with Microsoft and Adobe releasing fixes for severe vulnerabilities – including a critical, potentially wormable remote code execution bug known as the “Ping of Death” Barnes and Noble being hacked – and why some readers are unhappy with how the book purveyor announced the cyberattack DDoS extortion email threats hitting various companies across the globe – including Travelex Zoom finally rolling out end-to-end encryption on the video conferencing platform – and why this is different than the collaboration giant’s earlier “full encryption” claims Download the podcast here or listen below. [ ](http://iframe%20style=border:%20none%20src=//html5-player.libsyn.com/embed/episode/id/16421213/height/90/theme/custom/thumbnail/yes/direction/backward/render-playlist/no/custom-color/87A93A/%20height=90%20width=100%%20scrolling=no%20%20allowfullscreen%20webkitallowfullscreen%20mozallowfullscreen%20oallowfullscreen%20msallowfullscreen/iframe) Below find a lightly edited transcript of the podcast. Lindsey O’Donnell-Welch: Welcome back to the Threatpost news wrap podcast. This is Lindsey O’Donnell Welch with Threatpost and I am joined by Tara Seals, withThreatpost to break down the top news from the week ended October 16. Tara, how was your week? Tara Seals: Oh, pretty good, Lindsey. It was super busy as things in cybersecurity usually are. But this week was a little…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2020-10-16 09:00:002020-10-16 09:00:00News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org