πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ PowerPoint β€˜Weakness’ Opens Door to Malicious Mouse-Over Attack ❌

Novel hack allows an attacker to create a mouse-over in a PowerPoint file that triggers the installation of malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ Researchers Fool Biometric Scanners with 3D-Printed Fingerprints πŸ•΄

Tests on the fingerprint scanners of Apple, Microsoft, and Samsung devices reveal it's possible to bypass authentication with a cheap 3D printer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ After Adopting COVID-19 Lures, Sophisticated Groups Target Remote Workers πŸ•΄

While coronavirus-themed emails and files have been used as a lure for weeks, attackers now are searching for ways to actively target VPNs and remote workers to take advantage of weaker security.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Keeping Vigilant for BEC Amid COVID-19 Chaos πŸ•΄

FBI and security experts warn that attackers are particularly targeting cloud-based email systems at the moment.

πŸ“– Read

via "Dark Reading: ".
⚠ Google removes Android VPN with β€˜critical vulnerability’ from Play Store ⚠

Google has removed the SuperVPN program from the Google Play store after researchers notified it of a critical vulnerability.

πŸ“– Read

via "Naked Security".
⚠ Facebook’s new Tuned chat app lets couples keep their mush private ⚠

If you're OK with Facebook getting your phone number and storing your love notes, photos, shared daily diary and more, then Tune away, baes.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep34: Can you trust hackers on how not to get hacked? – Naked Security Podcast ⚠

Sophos experts discuss the biggest cybersecurity stories of the last week.

πŸ“– Read

via "Naked Security".
πŸ” Coronavirus-themed phishing emails and websites spoof the White House πŸ”

The phishing emails led to malicious websites that used the same HTML and CSS found in actual White House sites, says email security provider INKY.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Industries with critical infrastructure are at greater risk during the pandemic πŸ”

Operational technology and industrial systems are increasingly connected to the IT network, and organizations don't have the right tools to secure them, according to a security official.

πŸ“– Read

via "Security on TechRepublic".
❌ Cisco β€˜Critical Update’ Phishing Attack Steals Webex Credentials ❌

Emails purporting to be a Cisco "critical security advisory" are actually part of a phishing campaign trying to steal victims' Webex credentials.

πŸ“– Read

via "Threatpost".
❌ Zoom Taps Ex-Facebook CISO Amid Security Snafus, Lawsuit ❌

The online videoconferencing service added Alex Stamos to the team and has also formed an expert advisory board to grapple with the pains of its COVID-19 growth spurt.

πŸ“– Read

via "Threatpost".
πŸ›  netABuse Insufficient Windows Authentication Logic Scanner πŸ› 

netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Fleeceware on your iPhone? Don’t get caught out while penned up at home ⚠

The app's free. But the subscription most certainly isn't!

πŸ“– Read

via "Naked Security".
πŸ” Who has banned Zoom? Google, NASA, and more πŸ”

Zoom's security woes have led to a number of organizations, companies, and schools banning or restricting its use, with some recommending alternatives such as Microsoft Teams.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Malicious coronavirus-themed apps target Android devices πŸ”

Purporting to offer help and info on COVID-19, the apps can let hackers take control of devices to access files, contacts, the calendar, and more, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.11 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Zero Trust security: Go slowly in order to go big, says expert πŸ”

Zero Trust can seem scary to those accustomed to traditional security approaches. Here is how to get started with Zero Trust.

πŸ“– Read

via "Security on TechRepublic".
πŸ” E-commerce and home-based workers see increase of targeted fraud πŸ”

With more people working from home and e-commerce experiencing a boom-time, fraudsters have taken notice.

πŸ“– Read

via "Security on TechRepublic".