πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ How to rob an ATM? Let me count the ways… ⚠

A comprehensive new report lifts the lid on the sketchy state of ATM security.

πŸ“– Read

via "Naked Security".
πŸ” AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape πŸ”

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The majority of business pros aren't able to prevent cyberattacks πŸ”

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ AI Poised to Drive New Wave of Exploits πŸ•΄

Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.

πŸ“– Read

via "Dark Reading: ".
❌ Lock-Screen Bypass Bug Quietly Patched in Handsets ❌

The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Critical WordPress Flaw Grants Admin Access to Any Registered Site User ❌

The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 26M Texts Exposed in Poorly Secured Vovox Database πŸ•΄

The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to auto mount FAT32-formatted drives in Samba πŸ”

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
❌ Gmail Glitch Offers Stealthy Trick for Phishing Attacks ❌

The issue comes from how Gmail automatically files messages into the "Sent" folder.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance πŸ•΄

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Bluetooth Hack Affects Millions of Vehicles πŸ•΄

Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.

πŸ“– Read

via "Dark Reading: ".
❌ Emoji Attack Can Kill Skype for Business Chat ❌

The "Kitten of Doom" denial-of-service attack is easy to carry out.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Could have sworn I deleted that photo from my phone! [PODCAST] ⚠

This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!

πŸ“– Read

via "Naked Security".
πŸ” Is retaining a cybersecurity attorney a good idea for your business? πŸ”

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2008-7320

** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How military-style training may enhance your cybersecurity strategy πŸ”

Find out the benefits of realistic cybersecurity training, such as what is offered by IBM's X-Force Command Center. The facility is modeled on the approach used by the military and first responders.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 23 stories of the week ⚠

From the Microsoft mistake that left users fuming to the botnet that's pwned 100,000 routers, and everything in between. Catch up with all the stories from the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Did a copy-paste error reveal the US’s secret case against Assange? ⚠

A court filing in an unrelated case mentioned the need to seal documents to keep secret the fact that "Assange" has been charged.

πŸ“– Read

via "Naked Security".
⚠ Has that website been pwned? Firefox Monitor will tell you ⚠

Firefox Monitor, a breach notification website launched by Mozilla in September, can now deliver alerts from inside the Firefox browser.

πŸ“– Read

via "Naked Security".