πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Introducing 'Secure Access Service Edge' πŸ•΄

The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.

πŸ“– Read

via "Dark Reading: ".
πŸ” Android 11 security features and improvements you need to know πŸ”

If the Android 11 beta is an indication, Jack Wallen predicts it will be the most secure and best performing release. Developers and pro users, read about security and privacy features in Android 11.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook hoaxes back in the spotlight – what to tell your friends ⚠

At the risk of giving you a feeling of dΓ©jΓ  vu all over again, it's time to talk about Facebook hoaxes once more.

πŸ“– Read

via "Naked Security".
❌ E.U. Authorities Crack Encryption of Massive Criminal and Murder Network ❌

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.

πŸ“– Read

via "Threatpost".
πŸ” What are IT pros concerned about in the new normal? Security and flexibility πŸ”

There are a number of paramount concerns afoot among IT professionals. Learn some of the priorities from industry insiders and experts.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to run an SSH connection through Tor πŸ”

Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 11 stories of the week ⚠

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Boston bans government use of facial recognition ⚠

To help end systemic racism, we'll stay away from an error-prone technology that's been shown to have racial bias, the city council said.

πŸ“– Read

via "Naked Security".
❌ Email Sender Identity is Key to Solving the Phishing Crisis ❌

Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ How to Assess More Sophisticated IoT Threats πŸ•΄

Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.

πŸ“– Read

via "Dark Reading: ".
πŸ” Collaboration, Activity Monitoring Key to Identifying Hacker πŸ”

The FBI recently reflected on the the arrest of a hacker who stole intellectual property from a tech company, including how collaboration and activity monitoring played a role in tracking him down.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Purple Fox EK Adds Microsoft Exploits to Arsenal ❌

Two exploits for Microsoft vulnerabilities have been added to the Purple Fox EK, showing ongoing development.

πŸ“– Read

via "Threatpost".
πŸ” How much malware tools sell for on the Dark Web πŸ”

A low-quality batch of malicious tools can sell for as low as $70, while a premium set can go as high as $6,000, according to the security research site Privacy Affairs.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Phishing attack spoofs Twitter to steal account credentials πŸ”

A new phishing campaign spotted by Abnormal Security attempts to trick people with a phony Twitter security notification.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ BIG-IP Vulnerabilities Could be Big Trouble for Customers πŸ•΄

Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Android Adware Tied to Undeletable Malware πŸ•΄

Adware on inexpensive Android smartphone can carry additional malware and be undeletable.

πŸ“– Read

via "Dark Reading: ".
❌ Lazarus Group Adds Magecart to the Mix ❌

North Korea-based APT is targeting online payments made by American and European shoppers.

πŸ“– Read

via "Threatpost".
πŸ” How to secure your iOS Lock Screen πŸ”

Configure your iOS Lock Screen to block those picking up your device from reading messages, viewing the Today View, or interacting with Siri unless your device is unlocked first.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5 NSA-recommended strategies for improving your VPN security πŸ”

The US National Security Agency has noticed a surge in cyberattacks targeting VPNs since the COVID-19 pandemic has forced more people to work from home.

πŸ“– Read

via "Security on TechRepublic".
❌ Admins Urged to Patch Critical F5 Flaw Under Active Attack ❌

Security experts and the U.S. Cyber Command are urging admins to update a critical flaw in F5 Networks, which is under active attack.

πŸ“– Read

via "Threatpost".
πŸ•΄ Credit-Card Skimmer Seeks Websites Running Microsoft's ASP.NET πŸ•΄

The payment-card skimmer targets websites hosted on Microsoft IIS servers and running the ASP.NET web framework.

πŸ“– Read

via "Dark Reading: ".