🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Black Hat Europe Speaker Q&A: SoarTech's Fernando Maymi on 'Synthetic Humans' 🕴

Ahead of his Black Hat Europe appearance, SoarTech's Fernando Maymi explains how and why synthetic humans are critical to the future of cybersecurity.

📖 Read

via "Dark Reading: ".
🔐 Workers unaware of travel-related cybersecurity threats, survey finds 🔐

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.

📖 Read

via "Security on TechRepublic".
How to rob an ATM? Let me count the ways…

A comprehensive new report lifts the lid on the sketchy state of ATM security.

📖 Read

via "Naked Security".
🔐 AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape 🔐

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

📖 Read

via "Security on TechRepublic".
🔐 The majority of business pros aren't able to prevent cyberattacks 🔐

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

📖 Read

via "Security on TechRepublic".
🕴 AI Poised to Drive New Wave of Exploits 🕴

Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.

📖 Read

via "Dark Reading: ".
Lock-Screen Bypass Bug Quietly Patched in Handsets

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

📖 Read

via "Threatpost | The first stop for security news".
Critical WordPress Flaw Grants Admin Access to Any Registered Site User

The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.

📖 Read

via "Threatpost | The first stop for security news".
🕴 26M Texts Exposed in Poorly Secured Vovox Database 🕴

The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.

📖 Read

via "Dark Reading: ".
🔐 How to auto mount FAT32-formatted drives in Samba 🔐

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.

📖 Read

via "Security on TechRepublic".
Gmail Glitch Offers Stealthy Trick for Phishing Attacks

The issue comes from how Gmail automatically files messages into the "Sent" folder.

📖 Read

via "Threatpost | The first stop for security news".
🕴 BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance 🕴

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.

📖 Read

via "Dark Reading: ".
🕴 New Bluetooth Hack Affects Millions of Vehicles 🕴

Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.

📖 Read

via "Dark Reading: ".
Emoji Attack Can Kill Skype for Business Chat

The "Kitten of Doom" denial-of-service attack is easy to carry out.

📖 Read

via "Threatpost | The first stop for security news".
Could have sworn I deleted that photo from my phone! [PODCAST]

This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!

📖 Read

via "Naked Security".
🔐 Is retaining a cybersecurity attorney a good idea for your business? 🔐

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2008-7320

** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.

📖 Read

via "National Vulnerability Database".
🔐 How military-style training may enhance your cybersecurity strategy 🔐

Find out the benefits of realistic cybersecurity training, such as what is offered by IBM's X-Force Command Center. The facility is modeled on the approach used by the military and first responders.

📖 Read

via "Security on TechRepublic".
Monday review – the hot 23 stories of the week

From the Microsoft mistake that left users fuming to the botnet that's pwned 100,000 routers, and everything in between. Catch up with all the stories from the last seven days - it's weekly roundup time.

📖 Read

via "Naked Security".