๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โŒ Unpatched Android OS Flaw Allows Adversaries to Track User Location โŒ

The vulnerability is one of many with the same root cause: Cross-process information leakage.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ•ด Google Traffic Temporarily Rerouted via Russia, China ๐Ÿ•ด

The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Googleโ€™s G Suite, Search and Analytics Taken Down in Hijacking โŒ

Google cloud business customers were impacted by a Border Gateway Protocol hijacking.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
🕳 TrustArc Participates at California Lawyers Association IP Institute 🕳

<code>Media</code><code>On November 8th in sunny San Jose, TrustArc was pleased to take part at the California Lawyers Associationโ€™s annual IP Institute.  Speaking on a panel entitled GDPR: Lessons Learned from the Front Line, TrustArc shared tips and insights both for organizations still working towards GDPR compliance, and for those seeking to take their privacy programs to the next level, including for interoperability with other global privacy laws and frameworks.</code><code>Not lost in the discussion was the fact that many law firms, of all sizes, are likewise still looking to their own GDPR/privacy compliance, which is critical to their being viewed as trustworthy stewards of confidential client information.</code><code>During a discussion-based panel with lively audience questions, TrustArc Senior Counsel, Darren Abernethy, offered observations for companies and law firms based on TrustArcโ€™s unique position in the privacy and data protection ecosystemโ€“as a provider of privacy technology platform solutions, privacy consulting services, and certifications/verifications.  </code><code>Some of the practical topics discussed included:</code><code>Knowing and Documenting Your Data Points.  Companies should assemble cross-team privacy leads and think-through all of their business process activities, the purpose(s) of processing, and the categories of individuals and personal data being processed for each.  Then they can begin to analyze where they act as a data controller versus a data processor; the flow of personal data in and out of each business activity, including any disclosures to third parties; determine where likely high risk is involved for possible (DPIA) creation; and fully understand where/how cross-border transfers occur.  This is necessary for Article 30 records of processing, and is tremendously simplified across an organization using TrustArcโ€™s Data Flow Manager and Intelligence Engine.</code><code> </code><code>Individual Rights Management.  Companies should move away from ad hoc response processes in favor of having a customized, streamlined intake mechanism for centralized tracking of requests to timely honor the GDPRโ€™s default one-month timeframe for Arts. 15-22.  Anticipating possible requests based on a companyโ€™s Article 30 records, training staff on escalations, engaging politely with submitters to understand what they are really asking for, and having a reliable verification method to ensure a requester is the individual in question prior to providing any personal information, are also key measures.</code><code> </code><code>Correctly Capturing Consentโ€“Important for Compliance and M&A.  Companies should have defined solutions for being able to point to when and for what an individual provided consentโ€“whether for dropping cookies and processing data for cookie-related purposes, or for providing consent to receive direct marketing communications.  More and more companies are being asked for this information to demonstrate compliance during RFPs, via audits or during transactional due diligence.</code><code> </code><code>Tips around successful internal data protection preparation strategies seen with TrustArc customersโ€“from identifying privacy stakeholders to updating contracts.</code><code> </code><code>How GDPR relates to mobile ecosystem issues, geolocation and the California Consumer Privacy Actโ€“and the current status of the ePrivacy Regulation.</code><code> </code><code>The criticality of thinking through all of an organizationโ€™s business process activities in order to map data flows and prepare GDPR Article 30 records of processingโ€“while automating risk evaluations for possible Article 35 data protection impact assessments (DPIAs).</code><code> </code><code>Individual rights management issues, tips on setting up a program for data subject access requests (using centralized technology to do so), and verificatioโ€ฆ
๐Ÿ” Android Security Bulletin November 2018: What you need to know ๐Ÿ”

Another month where Android finds itself with a mixture of Critical and High vulnerabilities. Jack Wallen offers highlights.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to download your data stored by Apple ๐Ÿ”

Downloading a copy of your data that Apple stores in iCloud and other services is easier than ever. Learn how to get your copy and what to do with it. Learn more about this massive privacy change.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Empathy: The Next Killer App for Cybersecurity? ๐Ÿ•ด

The toughest security problems involve people not technology. Here's how to motivate your frontline employees all the way from the service desk to the corner office.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Getting to Know Magecart: An Inside Look at 7 Groups ๐Ÿ•ด

A new report spills the details on Magecart, the criminal groups driving it, and ongoing attacks targeting low- and high-profile victims.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” 4 communication fundamentals that should be in every disaster recovery plan ๐Ÿ”

See where the communication breakdowns are likely to occur--and revise the disaster recovery plan accordingly.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Sharpen Your Malware-Fighting Skills at Black Hat Europe ๐Ÿ•ด

Don't miss out on the Black Hat Briefings, Trainings, and Arsenal tools that will equip you with the knowledge and skills you need to deal with today's top malware.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Microsoft Patch Tuesday Recap: 12 Critical Bugs Fixed ๐Ÿ•ด

Eight of the 12 critical vulnerabilities addressed this month affect the Chakra Scripting Engine in Microsoft Edge.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2 โŒ

Microsoftโ€™s November Patch Tuesday fixes include mitigation against a zero-day vulnerability leaving Windows 7, Server 2008 and Server 2008 R2 open to attack.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
โš  Microsoft update breaks Calendar and Mail on Windows 10 phones โš 

Still reeling from last week's Windows 10 Pro debacle, Microsoft dropped a fresh pile of โ€œOops!โ€ onto Windows 10 Mobile users.

๐Ÿ“– Read

via "Naked Security".
โš  Support wouldnโ€™t change his password, so he mailed them a bomb โš 

The Cryptopay customer asked customer services for a new password. They refused, given that it was against the company privacy policy.

๐Ÿ“– Read

via "Naked Security".
โš  HTTP/3: Come for the speed, stay for the security โš 

Key personnel at the Internet Engineering Task Force (IETF) have suggested basing the next version of a core web protocol on Google technology.

๐Ÿ“– Read

via "Naked Security".
โš  Targeted ransomware attacks โ€“ SophosLabs 2019 Threat Report โš 

This year's SophosLabs Threat Report is out. We talk targeted ransomware attacks, and in particular, SamSam.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” How to improve enterprise IoT security: 5 tips ๐Ÿ”

Some 15% of companies struggling with IoT security lost at least $34 million in the last couple years. Here are five ways to stay better protected.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” 69% of ATMs can be hacked to spit cash in minutes ๐Ÿ”

ATM vulnerabilities highlight the importance of securing machines against network attacks, according to a Positive Technologies report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด To Click or Not to Click: The Answer Is Easy ๐Ÿ•ด

Mega hacks like the Facebook breach provide endless ammo for spearphishers. These six tips can help you stay safer.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” AI, IoT, and edge computing drive cybersecurity concerns for 2019 ๐Ÿ”

As companies adopt emerging technologies, the cyber risk landscape is set to grow larger in the new year, according to a Forcepoint report.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Can Businesses Stand Up to Cybercrime? Only 61% Say Yes ๐Ÿ•ด

While 96% of US organizations say business resilience should be core to company strategy, only 61% say it actually is.

๐Ÿ“– Read

via "Dark Reading: ".