πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Considerations for Seamless CCPA Compliance πŸ•΄

Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Anatomy of a Long-Con Phish πŸ•΄

A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20894

Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Making Sense of EARN IT & LAED Bills' Implications for Crypto πŸ•΄

After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ BG-IP Vulnerabilities Could be Big Trouble for Customers πŸ•΄

Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Building Security Strategies in Sub-Saharan Africa: Trends and Concerns πŸ•΄

Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-20419

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20418

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to prevent users from accessing the instance via an Application Denial of Service vulnerability in the /rendering/wiki endpoint. The affected versions are before version 8.8.0.

πŸ“– Read

via "National Vulnerability Database".
⚠ Google buys AR smart-glasses company North ⚠

They're not surveillance spectacles, says Google, just a piece in the jigsaw of "ambient computing", where helpfulness is all around you.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cybersecurity's Lament: There are No Cooks in Space πŸ•΄

Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.

πŸ“– Read

via "Dark Reading: ".
❌ Ring Doorbell’s Police Partnerships Questioned Over Racial Bias ❌

Amazon has placed a moratorium on police use of its facial recognition platform - but a congressman asked if that extends to its Ring smart doorbell in a new inquiry.

πŸ“– Read

via "Threatpost".
πŸ•΄ Introducing 'Secure Access Service Edge' πŸ•΄

The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.

πŸ“– Read

via "Dark Reading: ".
πŸ” Android 11 security features and improvements you need to know πŸ”

If the Android 11 beta is an indication, Jack Wallen predicts it will be the most secure and best performing release. Developers and pro users, read about security and privacy features in Android 11.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook hoaxes back in the spotlight – what to tell your friends ⚠

At the risk of giving you a feeling of dΓ©jΓ  vu all over again, it's time to talk about Facebook hoaxes once more.

πŸ“– Read

via "Naked Security".
❌ E.U. Authorities Crack Encryption of Massive Criminal and Murder Network ❌

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.

πŸ“– Read

via "Threatpost".
πŸ” What are IT pros concerned about in the new normal? Security and flexibility πŸ”

There are a number of paramount concerns afoot among IT professionals. Learn some of the priorities from industry insiders and experts.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to run an SSH connection through Tor πŸ”

Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 11 stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Boston bans government use of facial recognition ⚠

To help end systemic racism, we'll stay away from an error-prone technology that's been shown to have racial bias, the city council said.

πŸ“– Read

via "Naked Security".
❌ Email Sender Identity is Key to Solving the Phishing Crisis ❌

Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ How to Assess More Sophisticated IoT Threats πŸ•΄

Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.

πŸ“– Read

via "Dark Reading: ".