πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Hacking MiSafes’ smartwatches for kids is child’s play ⚠

Researchers describe breaking into the watches as "probably the simplest hack we have ever seen."

πŸ“– Read

via "Naked Security".
⚠ Judge asks if Alexa is witness to a double murder ⚠

A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat Europe Speaker Q&A: SoarTech's Fernando Maymi on 'Synthetic Humans' πŸ•΄

Ahead of his Black Hat Europe appearance, SoarTech's Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ” Workers unaware of travel-related cybersecurity threats, survey finds πŸ”

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.

πŸ“– Read

via "Security on TechRepublic".
⚠ How to rob an ATM? Let me count the ways… ⚠

A comprehensive new report lifts the lid on the sketchy state of ATM security.

πŸ“– Read

via "Naked Security".
πŸ” AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape πŸ”

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The majority of business pros aren't able to prevent cyberattacks πŸ”

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ AI Poised to Drive New Wave of Exploits πŸ•΄

Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.

πŸ“– Read

via "Dark Reading: ".
❌ Lock-Screen Bypass Bug Quietly Patched in Handsets ❌

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Critical WordPress Flaw Grants Admin Access to Any Registered Site User ❌

The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 26M Texts Exposed in Poorly Secured Vovox Database πŸ•΄

The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to auto mount FAT32-formatted drives in Samba πŸ”

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
❌ Gmail Glitch Offers Stealthy Trick for Phishing Attacks ❌

The issue comes from how Gmail automatically files messages into the "Sent" folder.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance πŸ•΄

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Bluetooth Hack Affects Millions of Vehicles πŸ•΄

Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.

πŸ“– Read

via "Dark Reading: ".
❌ Emoji Attack Can Kill Skype for Business Chat ❌

The "Kitten of Doom" denial-of-service attack is easy to carry out.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Could have sworn I deleted that photo from my phone! [PODCAST] ⚠

This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!

πŸ“– Read

via "Naked Security".
πŸ” Is retaining a cybersecurity attorney a good idea for your business? πŸ”

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2008-7320

** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.

πŸ“– Read

via "National Vulnerability Database".