πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Run ANDROID on an iPhone? Are you SERIOUS?!? ⚠

It's true - Android on an iPhone. OK, a few things don't work yet... such as sound. And the phone bit.

πŸ“– Read

via "Naked Security".
πŸ•΄ Securing Our Elections Requires Change in Technology, People & Attitudes πŸ•΄

Increasing security around our election process and systems will take a big effort from many different parties. Here's how.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Physical Flaws: Intel's Root-of-Trust Issue Mostly Mitigated πŸ•΄

An insider, or security expert with physical access, can compromise the hardware protections of Intel chips sold in the past five years.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to scan your WordPress sites for vulnerabilities πŸ”

How confident are you with the security of your WordPress deployments? If you're not 100% confident, you need to make use of the wpscan tool.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 3/6 Edition πŸ”

National security professionals tightly monitor Super Tuesday voting, Coronavirus complicates security operations, and more  - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ 5 tips for working safely from home ⚠

Don't let teleworking due to concerns over the coronavirus (Covid-19) put your cybersecurity health at risk....

πŸ“– Read

via "Naked Security".
πŸ” 10 best practices for using Windows servers πŸ”

Follow these tips to keep your Windows-based servers operating smoothly, securely, and efficiently.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical Zoho Zero-Day Flaw Disclosed ❌

A Zoho zero day vulnerability and proof of concept (PoC) exploit code was disclosed on Twitter.

πŸ“– Read

via "Threatpost".
❌ Spread of Coronavirus-Themed Cyberattacks Persists with New Attacks ❌

In cybersecurity circles, the Coronavirus is spurring anxiety over the virtual abuse of the deadly disease by scammers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Siemens Shares Incident Response Playbook for Energy Infrastructure πŸ•΄

The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity πŸ•΄

The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyber threats our nation and its businesses face today.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former Acting Inspector General Charged in Federal Fraud Scheme πŸ•΄

A federal grand jury has indicted Charles K. Edwards on 16 counts related to a conspiracy to steal software from one department and sell an enhanced version to another.

πŸ“– Read

via "Dark Reading: ".
πŸ” American cases added to 3D map showing the spread of COVID-19 πŸ”

The outbreak is slowing down in China while the WHO warns the rest of the world to "pull out all the stops" to control the spread of the illness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How world leaders use big data πŸ”

It's a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum's director weighs in.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How world leaders use big data πŸ”

It's a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum's director weighs in.

πŸ“– Read

via "Security on TechRepublic".
❌ Next-Gen Ransomware Packs a β€˜Human’ Punch, Microsoft Warns ❌

Ryuk, DoppelPaymer, Parinacota and other ransomware groups are getting more sophisticated, Microsoft warns.

πŸ“– Read

via "Threatpost".
πŸ•΄ 7 Cloud Attack Techniques You Should Worry About πŸ•΄

Security pros detail the common and concerning ways attackers target enterprise cloud environments.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Ransomware Variant Developed Entirely as Shellcode πŸ•΄

PwndLocker is harder to detect than other crypto-malware, Crypsis Group says.

πŸ“– Read

via "Dark Reading: ".
⚠ IWD: biometrics, machine learning, privacy and being a woman in tech – Naked Security Podcast ⚠

To celebrate International Women's Day we invite you to this all-female splinter episode.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-11021

setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 29 stories of the week ⚠

From an ultrasonic attack on Siri and Google Assistant to the guy who hacked back at tech support scammers - and everything in between.

πŸ“– Read

via "Naked Security".