πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ HSBC: Security Breach Exposes Account, Transaction Data πŸ•΄

Unauthorized users accessed HSBC accounts between Oct. 4 and 14, the bank reports in a letter to customers.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10077

Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0 for Ruby allows remote attackers to cause a denial of service (application crash) via a call in a situation where :some_key is present in keep_keys but not present in the hash.

πŸ“– Read

via "National Vulnerability Database".
πŸ” These factors could inhibit the growth of IoT and AI πŸ”

With every new technology comes a hype cycle followed by a wave of disappointment, says Schneider Electric Chief Digital Officer Herve Coureil.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why the convergence of IoT and AI could change business forever πŸ”

The Internet of Things, expected to grow exponentially over the next half decade, will generate the essential data that AI systems need to automate industry, says Schneider Electric Chief Digital Officer Herve Coureil.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security πŸ•΄

Vulnerabilities in Samsung, Crucial storage devices enable data recovery without a password or decryption key, researchers reveal.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers ❌

One-third of respondents in a new poll said that have been a victim of fraud or identity theft in the past.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Most Businesses to Add More Cloud Security Tools πŸ•΄

Cloud adoption drives organizations to spend in 2019 as they learn traditional security practices can't keep up.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'PortSmash' Brings New Side-Channel Attack to Intel Processors πŸ•΄

New vulnerability exposes encryption keys in the first proof-of-concept code.

πŸ“– Read

via "Dark Reading: ".
❌ HSBC Data Breach Hits Online Banking Customers ❌

The data breach includes names, addresses, transaction histories, account information and more.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Android November update fixes flaws galore ⚠

Android's November security bulletin is here and there’s more to patch, and more urgency about applying them.

πŸ“– Read

via "Naked Security".
πŸ” What businesses can learn from political campaigns about using big data πŸ”

Chris Wilson of WPA Intelligence explains how businesses could use predictive analytics to target customers, much like how political campaigners use targeting of potential voters.

πŸ“– Read

via "Security on TechRepublic".
⚠ WhatsApp β€˜martinelli’ warning is a hoax, don’t forward it ⚠

A WhatsApp chain letter is warning of a malware-packing video called "martinelli", and selling its lie with a grain of truth.

πŸ“– Read

via "Naked Security".
⚠ Serious XSS flaw discovered in Evernote for Windows, update now! ⚠

Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.

πŸ“– Read

via "Naked Security".
⚠ Voting machine manual tells officials to reuse weak passwords ⚠

The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.

πŸ“– Read

via "Naked Security".
πŸ” Top 20 application vulnerabilities in the enterprise are dominated by Adobe and Microsoft πŸ”

Among the 20 application vulnerabilities, half were for Adobe Flash and 20% were by Microsoft Office.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why you should use a password manager πŸ”

Jack Wallen discusses why everyone should use a password manager.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 20 Cybersecurity Firms to Watch πŸ•΄

A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 5 Reasons Why Threat Intelligence Doesn't Work πŸ•΄

Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.

πŸ“– Read

via "Dark Reading: ".
πŸ” Consumers are more concerned with cybersecurity and data privacy in 2018 πŸ”

The majority of users would stop interacting with a brand after a breach.

πŸ“– Read

via "Security on TechRepublic".
❌ Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw ❌

A sophisticated proxy code has infected hundreds of thousands of devices already.

πŸ“– Read

via "The first stop for security news | Threatpost ".