🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
Judge asks if Alexa is witness to a double murder

A judge has ordered Amazon to turn over any recordings an Echo device may have made around the time a horrific crime occurred.

📖 Read

via "Naked Security".
🕴 Black Hat Europe Speaker Q&A: SoarTech's Fernando Maymi on 'Synthetic Humans' 🕴

Ahead of his Black Hat Europe appearance, SoarTech's Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.

📖 Read

via "Dark Reading: ".
🔐 Workers unaware of travel-related cybersecurity threats, survey finds 🔐

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.

📖 Read

via "Security on TechRepublic".
How to rob an ATM? Let me count the ways…

A comprehensive new report lifts the lid on the sketchy state of ATM security.

📖 Read

via "Naked Security".
🔐 AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape 🔐

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

📖 Read

via "Security on TechRepublic".
🔐 The majority of business pros aren't able to prevent cyberattacks 🔐

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

📖 Read

via "Security on TechRepublic".
🕴 AI Poised to Drive New Wave of Exploits 🕴

Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.

📖 Read

via "Dark Reading: ".
Lock-Screen Bypass Bug Quietly Patched in Handsets

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

📖 Read

via "Threatpost | The first stop for security news".
Critical WordPress Flaw Grants Admin Access to Any Registered Site User

The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.

📖 Read

via "Threatpost | The first stop for security news".
🕴 26M Texts Exposed in Poorly Secured Vovox Database 🕴

The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.

📖 Read

via "Dark Reading: ".
🔐 How to auto mount FAT32-formatted drives in Samba 🔐

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.

📖 Read

via "Security on TechRepublic".
Gmail Glitch Offers Stealthy Trick for Phishing Attacks

The issue comes from how Gmail automatically files messages into the "Sent" folder.

📖 Read

via "Threatpost | The first stop for security news".
🕴 BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance 🕴

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.

📖 Read

via "Dark Reading: ".
🕴 New Bluetooth Hack Affects Millions of Vehicles 🕴

Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.

📖 Read

via "Dark Reading: ".
Emoji Attack Can Kill Skype for Business Chat

The "Kitten of Doom" denial-of-service attack is easy to carry out.

📖 Read

via "Threatpost | The first stop for security news".
Could have sworn I deleted that photo from my phone! [PODCAST]

This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!

📖 Read

via "Naked Security".
🔐 Is retaining a cybersecurity attorney a good idea for your business? 🔐

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2008-7320

** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.

📖 Read

via "National Vulnerability Database".
🔐 How military-style training may enhance your cybersecurity strategy 🔐

Find out the benefits of realistic cybersecurity training, such as what is offered by IBM's X-Force Command Center. The facility is modeled on the approach used by the military and first responders.

📖 Read

via "Security on TechRepublic".