πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 8 Phishing Lures Preying on Pandemic Panic πŸ•΄

Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.

πŸ“– Read

via "Dark Reading: ".
❌ Travelex Pays $2.3M in Bitcoin to Hackers Who Hijacked Network in January ❌

The payout stems from a system-wide attack that knocked global networks offline on New Year’s Eve and reflects a shift in thinking about ransom payouts

πŸ“– Read

via "Threatpost".
πŸ•΄ 10 Ways to Spot a Security Fraud πŸ•΄

There is no shortage of people presenting themselves as security experts. Some of them truly are. The others...

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 4/10 πŸ”

Financial companies leave database exposed, Maze Ransomware targets Oil Giant, and Facebook releases location data to help the fight against Covid-19 - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Criminals Selling Videoconferencing Credentials on Dark Web πŸ•΄

Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers' targets.

πŸ“– Read

via "Dark Reading: ".
πŸ” 35% of Zoom users fear data leaks amid the platform's security issues πŸ”

12% of users have reportedly stopped using Zoom altogether, the social platform Blind found.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple App Store Riddled With Money-Sucking Fleeceware Apps ❌

Researchers warn that apps that market themselves as "free" are tricking users to subscribe to services that rack up as much as $500 in charges yearly.

πŸ“– Read

via "Threatpost".
πŸ•΄ When All Behavior is Abnormal, How Do We Detect Anomalies? πŸ•΄

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?

πŸ“– Read

via "Dark Reading: ".
πŸ” Strengthen your IT security posture with policies to defend your network, data, and users πŸ”

Policies make it easy to set a training plan for end users and improve risk management strategies.

πŸ“– Read

via "Security on TechRepublic".
❌ Critical VMware Bug Opens Up Corporate Treasure to Hackers ❌

The bug -- rated 10 in severity -- potentially affects large numbers of corporate VMs and hosts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Only 40% of Small Business Owners Have a Cybersecurity Policy πŸ•΄

Small business owners are concerned about cyberattacks targeting remote workers but lack the resources to invest in security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9547

An issue was discovered on Samsung mobile devices with JBP(4.3) and KK(4.4.2) software. Because the READ_LOGS permission is mishandled, sensitive information is disclosed in a world-readable copy of the log file if the error message is "Unhandled exception in Dalvik VM," "Application not responding ANR event," or "Crash on an application's native code." The Samsung ID is SVE-2015-2885 (October 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9546

An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-06-16. In some cases, HTTP is used for an Inputmethod, rather than HTTPS. A man-in-the-middle attacker can modify the client-server data stream to insert directory traversal sequences into an extracted file path. The Samsung ID is SVE-2015-4363 (November 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-8546

An issue was discovered on Samsung mobile devices with software through 2015-11-12, affecting the Galaxy S6/S6 Edge, Galaxy S6 Edge+, and Galaxy Note5 with the Shannon333 chipset. There is a stack-based buffer overflow in the baseband process that is exploitable for remote code execution via a fake base station. The Samsung ID is SVE-2015-5123 (December 2015).

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5524

An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-05-13. There is a buffer overflow in datablock_write because the amount of received data is not validated. The Samsung ID is SVE-2015-4018 (December 2015).

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to enable SMS verification code autofill in Android πŸ”

Starting with Android 9, you can make two-factor authentication even easier.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to enable SMS verification code autofill in Android πŸ”

Starting with Android 9, you can make two-factor authentication even easier.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ SFO Hit by Web Compromise πŸ•΄

Web app credentials were stolen in attacks on two airport websites.

πŸ“– Read

via "Dark Reading: ".
❌ WooCommerce Falls to Fresh Card-Skimmer Malware ❌

The payment-card stealer differs from typical malware targeting WordPress-based e-commerce environments.

πŸ“– Read

via "Threatpost".
❌ Apple, Google Team on Coronavirus Tracking – Sparking Privacy Fears ❌

Apple and Google announced that decentralized Bluetooth technology will soon be rolled out for coronavirus contact tracing. The privacy implications are worrisome for some.

πŸ“– Read

via "Threatpost".
⚠ Sextortion emails and porn scams are back – don’t let them scare you! ⚠

There is no video and the whole thing is a scam to prey on your fears.

πŸ“– Read

via "Naked Security".