๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โš  Signal secure messaging can now identify you without a phone number โš 

Signal decouples its secure messaging service from your phone number - a bit.

๐Ÿ“– Read

via "Naked Security".
โš  The ransomware that attacks you from inside a virtual machine โš 

In a recent attack, Ragnar Locker ransomware was seen encrypting victim's files while shielded from security software inside a virtual machine.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Security & Trust Ratings Proliferate: Is That a Good Thing? ๐Ÿ•ด

Phishing ratings, security ratings, human-ness ratings -- we are looking at a future filled with grades of security and trustworthiness. But there is a downside.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th ๐Ÿ•ด

Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues...

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด Former Salesforce Execs Launch Data Protection Startup ๐Ÿ•ด

Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Friday Five: 5/22 Edition ๐Ÿ”

The European Parliament suffers a cyber-attack, ransomware gang threatens to leak celebrities' information, and Microsoft warns of a COVID-19 themed phishing campaign - catch up on the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
๐Ÿ” 3 ways the COVID-19 pandemic is impacting consumer behavior and fraud ๐Ÿ”

E-commerce is on the rise, and digital transformation for businesses must be a top priority in the coronavirus era, according to a new report. Here are the three takeaways.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Data researchers at odds: Will Americans opt in or out of COVID-19 contact tracing apps? ๐Ÿ”

Results from separate studies by Checkmarx and ExpressVPN reveal consumers won't easily share their personal information with tracing apps due to concern for misuse.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด 5 Tips for Fighting Credential Stuffing Attacks ๐Ÿ•ด

With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Google Cloud VP: Strong encryption makes working from home safer ๐Ÿ”

Find out how G Suite and Google Meet help employees and students work and study at home, and why encryption is key.

๐Ÿ“– Read

via "Security on TechRepublic".
โš  Monday review โ€“ the hot 16 stories of the week โš 

From virtual machine ransomware to changes in Signal secure messaging - and everything in between. It's your weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
โš  What is the dark web? Your questions answered, in plain English โš 

Watch this new video from our YouTube channel - the dark web explained without jargon or judgment.

๐Ÿ“– Read

via "Naked Security".
โŒ 70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs โŒ

A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.

๐Ÿ“– Read

via "Threatpost".
โŒ ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It โŒ

Even seeing data breaches in the news, more than half of consumers are still reusing passwords.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” How to detect bots: What you need to know ๐Ÿ”

Akamai's CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to detect bots: What you need to know ๐Ÿ”

Akamai's CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Akamai CTO on how bots are used online in legal and illegal ways ๐Ÿ”

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” Akamai CTO on how bots are used online in legal and illegal ways ๐Ÿ”

Learn what a bot is, the spectrum of ways bots are used online (especially in social media), and how bots might be used in the next election cycle.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How bots impact retail and e-commerce ๐Ÿ”

Akamai CTO Patrick Sullivan explains how bots affect pricing and availability for various retail items. He also offers consumers advice on protecting themselves from fraud.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to run an SSH connection through Tor ๐Ÿ”

Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.

๐Ÿ“– Read

via "Security on TechRepublic".