πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Congress Passes Bill for New Federal Cybersecurity Agency πŸ•΄

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Congress Passes Bill to Create New Federal Cybersecurity Agency πŸ•΄

Cybersecurity and Infrastructure Security Agency Act now headed to President Trump for signing into law.

πŸ“– Read

via "Dark Reading: ".
❌ tRat Emerges as New Pet for APT Group TA505 ❌

The modular malware seems to be in a testing phase, but TA505's interest made researchers take note.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge πŸ•΄

Building cybersecurity skills is a must; paying a lot for the education is optional. Here are seven options for increasing knowledge without depleting a budget.

πŸ“– Read

via "Dark Reading: ".
⚠ AI-generated β€˜skeleton keys’ fool fingerprint scanners ⚠

Artificial intelligence can be used to 'grow' fake fingerprints that pack in common features, fooling scanners.

πŸ“– Read

via "Naked Security".
⚠ Hacking MiSafes’ smartwatches for kids is child’s play ⚠

Researchers describe breaking into the watches as "probably the simplest hack we have ever seen."

πŸ“– Read

via "Naked Security".
⚠ Judge asks if Alexa is witness to a double murder ⚠

A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Europe Speaker Q&A: SoarTech's Fernando Maymi on 'Synthetic Humans' πŸ•΄

Ahead of his Black Hat Europe appearance, SoarTech's Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ” Workers unaware of travel-related cybersecurity threats, survey finds πŸ”

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.

πŸ“– Read

via "Security on TechRepublic".
⚠ How to rob an ATM? Let me count the ways… ⚠

A comprehensive new report lifts the lid on the sketchy state of ATM security.

πŸ“– Read

via "Naked Security".
πŸ” AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape πŸ”

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The majority of business pros aren't able to prevent cyberattacks πŸ”

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ AI Poised to Drive New Wave of Exploits πŸ•΄

Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.

πŸ“– Read

via "Dark Reading: ".
❌ Lock-Screen Bypass Bug Quietly Patched in Handsets ❌

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Critical WordPress Flaw Grants Admin Access to Any Registered Site User ❌

The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 26M Texts Exposed in Poorly Secured Vovox Database πŸ•΄

The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to auto mount FAT32-formatted drives in Samba πŸ”

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
❌ Gmail Glitch Offers Stealthy Trick for Phishing Attacks ❌

The issue comes from how Gmail automatically files messages into the "Sent" folder.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance πŸ•΄

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Bluetooth Hack Affects Millions of Vehicles πŸ•΄

Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.

πŸ“– Read

via "Dark Reading: ".