๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โš  Mobile and IoT attacks โ€“ SophosLabs 2019 Threat Report โš 

As internet users migrate from desktop and laptop computers to mobile and Internet of Things (IoT) platforms, cybercriminals are too.

๐Ÿ“– Read

via "Naked Security".
โš  Cryptocurrency โ€˜mintingโ€™ flaw could have leached money from exchanges โš 

Ethereum's complexity proves to be a rich source of bugs, again.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” Google, Mozilla working on letting web apps edit files despite warning it could be 'abused in terrible ways' ๐Ÿ”

The firms, known for their Chrome and Firefox web browsers, are heading a group that is devising a way for users to save changes they make using web apps.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ ThreatList: One-Third of Firms Say Their Container Security Lags โŒ

More than one-third of respondents in a new survey havenโ€™t started or are just creating their security strategy plans.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
โŒ Old Printer Vulnerabilities Die Hard โŒ

New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” 5 reasons to improve cybersecurity by updating software ๐Ÿ”

Wake up, cybersecurity pros, and don't let your business be an easy target for cybercriminals. Learn why keeping digital infrastructure up-to-date should be an essential part of cybersecurity strategy.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Threatpost News Wrap Podcast for Nov. 23 โŒ

From Ford data security speculation to the VisionDirect data breach, the Threatpost editors talk about this week's biggest stories.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” 8 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online ๐Ÿ”

The holiday season isn't just busy for shoppers--it's busy for cybercriminals, too. Here's a holiday shopping safety guide with advice on how to stay safe online.

๐Ÿ“– Read

via "Security on TechRepublic".
<b>&#9000; How to Shop Online Like a Security Pro &#9000;</b>

<code>โ€˜Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So hereโ€™s a quick refresher course on how to make it through the next few weeks without getting snookered online.</code><code>Media</code><code>Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.</code><code>Even people who shop mainly at big-name online stores can get scammed if theyโ€™re not wary of too-good-to-be-true offers. For example, KrebsOnSecurity got taken for hundreds of dollars just last year after trying to buy a pricey Sonos speaker from an established Amazon merchant who was selling it new and unboxed at huge discount.</code><code>I later received an email from the seller, who said his Amazon account had been hacked and abused by scammers to create fake sales. Amazon ultimately refunded the money, but if this happens to you around the holidays it could derail plans to get all your shopping done before the expected gift-giving day arrives.</code><code>Here are some other safety and security tips to keep in mind when shopping online:</code><code>-WHEN IN DOUBT, CHECK โ€˜EM OUT: If you donโ€™t know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation. After all, itโ€™s not uncommon for bargain basement phantom Web sites to materialize during the holiday season, and then vanish forever not long afterward.</code><code>If youโ€™re buying from an online store that is brand new, the risk that you will get scammed increases significantly.  How do you know the lifespan of a site selling that must-have gadget at the lowest price? One easy way to get a quick idea is to run a basic WHOIS search on the siteโ€™s domain name. The more recent the siteโ€™s โ€œcreatedโ€ date, the more likely it is a phantom store.</code><code>-USE A CREDIT CARD: Itโ€™s nearly impossible for consumers to tell how secure a main street or online merchant is, and safety seals or attestations that something is โ€œhacker safeโ€ are a guarantee of nothing. In my experience, such sites are just as likely to be compromised as e-commerce sites without these dubious security seals.</code><code>No, itโ€™s best just to shop as if theyโ€™re all compromised. With that in mind, if you have the choice between using a credit or debit card, shop with your credit card.</code><code>Sure, the card associations and your bank are quick to point out that youโ€™re not liable for fraudulent charges that you report in a timely manner, whether itโ€™s debit or a credit card. But this assurance may ring hollow if you wake up one morning to find your checking accounts emptied by card thieves after shopping at a breached merchant with a debit card.</code><code>Who pays for the fees levied against you by different merchants when your checks bounce? You do. Does the bank reimburse you when your credit score takes a ding because your mortgage or car payment was late? Donโ€™t hold your breath.</code><code>-PADLOCK, SCHMADLOCK: For years, consumers have been told to look for the padlock when shopping online. Maybe this was once sound advice. But to my mind, the โ€œlook for the lockโ€ mantra has created a false sense of security for many Internet users, and has contributed to a dangerous and widespread misunderstanding about what the lock icon is really meant to convey.</code><code>To be clear, you absolutely should run away from any e-commerce site that does not include the padlock (i.e., its Web address does not begin with โ€œhttps://โ€).  But the presence of a padlock icon next to the Web site name in your browserโ€™s address bar does not meanโ€ฆ
โŒ Spotify Phishers Hijack Music Fansโ€™ Accounts โŒ

The credentials could be used to glean a variety of intel on the victims.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
โš  Monday review โ€“ the hot 18 stories of the week โš 

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
โš  Spectre mitigation guts Linux 4.20 performance โš 

One of Intelโ€™s fixes for the Spectre variant 2 chip flaw appears to have taken a big bite out of the performance of the latest Linux kernel.

๐Ÿ“– Read

via "Naked Security".
โš  His phone went dark, then $1m was sucked out in SIM-swap crypto-heist โš 

A 21-year-old allegedly SIM-swapped Silicon Valley execsโ€™ phones to steal cryptocurrency, including one man's $1m tuition fund for his kids.

๐Ÿ“– Read

via "Naked Security".
โš  That Black Mirror episode with the social ratings? Itโ€™s happening IRL โš 

Not picking up after your dog will cost you 10 points, for example, in China's Black Mirror-esque plan to socially score citizens.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” LinkedIn used 18M non-member emails to target Facebook ads. Were you a victim? ๐Ÿ”

A Data Protection Commissioner investigation found that LinkedIn violated data protection policies shortly before onset of GDPR.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด Paper Trail Absence May Still Plague 2020 Election ๐Ÿ•ด

The recommendation for paper ballots may go unheeded in all or part of at least 6 states in the next national election.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ•ด 7 Real-Life Dangers That Threaten Cybersecurity ๐Ÿ•ด

Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared.

๐Ÿ“– Read

via "Dark Reading: ".
<b>&#9000; Half of all Phishing Sites Now Have the Padlock &#9000;</b>

<code>Maybe you were once advised to โ€œlook for the padlockโ€ as a means of telling legitimate e-commerce sites from phishing or malware traps. Unfortunately, this has never been more useless advice. New research indicates that half of all phishing scams are now hosted on Web sites whose Internet address includes the padlock and begins with โ€œhttps://โ€.</code><code>Media</code><code>A live Paypal phishing site that uses https:// (has the green padlock).</code><code>Recent data from anti-phishing company PhishLabs shows that 49 percent of all phishing sites in the third quarter of 2018 bore the padlock security icon next to the phishing site domain name as displayed in a browser address bar. Thatโ€™s up from 25 percent just one year ago, and from 35 percent in the second quarter of 2018.</code><code>This alarming shift is notable because a majority of Internet users have taken the age-old โ€œlook for the lockโ€ advice to heart, and still associate the lock icon with legitimate sites. A PhishLabs survey conducted last year found more than 80% of respondents believed the green lock indicated a website was either legitimate and/or safe.</code><code>In reality, the https:// part of the address (also called โ€œSecure Sockets Layerโ€ or SSL) merely signifies the data being transmitted back and forth between your browser and the site is encrypted and canโ€™t be read by third parties. The presence of the padlock does not mean the site is legitimate, nor is it any proof the site has been security-hardened against intrusion from hackers.</code><code>Media</code><code>A live Facebook phish that uses SSL (has the green padlock).</code><code>Most of the battle to combat cybercrime involves defenders responding to offensive moves made by attackers. But the rapidly increasing adoption of SSL by phishers is a good example in which fraudsters are taking their cue from legitimate sites.</code><code>โ€œPhishLabs believes that this can be attributed to both the continued use of SSL certificates by phishers who register their own domain names and create certificates for them, as well as a general increase in SSL due to the Google Chrome browser now displaying โ€˜Not secureโ€™ for web sites that do not use SSL,โ€ said John LaCour, chief technology officer for the company. โ€œThe bottom line is that the presence or lack of SSL doesnโ€™t tell you anything about a siteโ€™s legitimacy.โ€</code><code>The major Web browser makers work with a number of security organizations to index and block new phishing sites, often serving bright red warning pages that flag the page of a phishing scam and seek to discourage people from visiting the sites. But not all phishing scams get flagged so quickly.</code><code>I spent a few minutes browsing phishtank.com for phishing sites that use SSL, and found this cleverly crafted page that attempts to phish credentials from users of Bibox, a cryptocurrency exchange. Click the image below and see if you can spot whatโ€™s going on with this Web address:</code><code>Media</code><code>This live phish targets users of cryptocurrency exchange Bibox. Look carefully at the URL in the address bar, and youโ€™ll notice a squiggly mark over the โ€œiโ€ in Bibox. This is an internationalized domain name, and the real address is https://www.xn--bbox-vw5a[.]com/login</code><code>

</code><code>Load the live phishing page at https://www.xn--bbox-vw5a[.]com/login (that link has been hobbled on purpose) in Google Chrome and youโ€™ll get a red โ€œDeceptive Site Aheadโ€ warning. Load the address above โ€” known as โ€œpunycodeโ€ โ€” in Mozilla Firefox and the page renders just fine, at least as of this writing.</code><code>This phishing site takes advantage of internationalized domain names (IDNs) to introduce visual confusion. In this case, the โ€œiโ€ in Bibox.com is rendered as the Vietnamese character โ€œ&#7881;,โ€ which is extremely difficult to distinguish in a URL address bar.</code><code>As KrebsOnSecurity noted in Marchโ€ฆ
๐Ÿ•ด Transforming into a CISO Security Leader ๐Ÿ•ด

Are you thinking of changing your career route from techie to CISO? Are you making the right choice? Only you know for sure.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ User Confidence in Smartphone Security Abysmal โŒ

Sixty-six of percent of phone users said they had suffered data-related harm: 11 percent suffered identity theft, 22 percent account hacking, 14 percent credit cards hacking and 12 percent financial fraud. 

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” IoT security market will hit $9.88B by 2025, as privacy issues abound ๐Ÿ”

As IoT devices flood the market, consumers are pushing for more privacy initiatives, according to recent Grand View Research report.

๐Ÿ“– Read

via "Security on TechRepublic".