πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ TA505 Crooks are Now Targeting US Retailers with Personalized Campaigns ❌

Threat group moves away from β€œsmash-and-grab” attacks and adopts a boutique approach to targeting victims.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Top 5 features smart homes still need πŸ”

Tom Merritt explains five ways smart home technology is evolving.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 ways smart homes are getting smarter πŸ”

Tom Merritt explains five ways smart home technology is evolving.

πŸ“– Read

via "Security on TechRepublic".
❌ Australia Anti-Encryption Law Triggers Sweeping Backlash ❌

A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Iranian Nationals Charged for Atlanta Ransomware Attack πŸ•΄

The March attack used SamSam ransomware to infect 3,789 computers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Simplify Everything': Google Talks Container Security in 2019 πŸ•΄

Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Criminals Use Locally Connected Devices to Attack, Loot Banks πŸ•΄

Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Gift Card-Themed BEC Holiday Scams Spike ❌

Watch out for emails about gift cards and corporate donations, researcher warn.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 'PowerSnitch' Hacks Androids via Power Banks πŸ•΄

Researcher demonstrates how attackers could steal data from smartphones while they charge up.

πŸ“– Read

via "Dark Reading: ".
πŸ” Networking trends and news: 2018 year in review πŸ”

Networking is a fairly old subject, but there are still plenty of interesting things happening. Highlights from 2018 include stories about security, 5G, net neutrality, the Linux Foundation, and more.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 21 stories of the week ⚠

From UPnP router attacks to the Kubernetes cloud computing bug, and everything in between. It's time for your weekly roundup.

πŸ“– Read

via "Naked Security".
⚠ Microsoft calls for laws on facial recognition, issues principles ⚠

Profits are nice, but "We don’t believe that the world will be best served by a commercial race to the bottom," says President Brad Smith.

πŸ“– Read

via "Naked Security".
⚠ Microsoft’s gutting Edge and stuffing it with Chromium ⚠

Edge joins Chrome, Opera, Vivaldi, Yandex, and Brave. Better for web compatibility, but if one thing breaks, they all break.

πŸ“– Read

via "Naked Security".
⚠ Android click fraud apps mimic Apple iPhones to boost revenue ⚠

SophosLabs has uncovered a click fraud campaign in which malicious Android apps masquerade as being hosted on Apple devices to earn rewards.

πŸ“– Read

via "Naked Security".
⚠ Massive botnet chews through 20,000 WordPress sites ⚠

Attackers have infected 20,000 WordPress sites by brute-forcing administrator usernames and passwords.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 CISO Resolutions for 2019 πŸ•΄

The ultimate to-do list for ambitious security leaders.

πŸ“– Read

via "Dark Reading: ".
πŸ” IT leaders spend 10% more money improving customer experience than security πŸ”

Prioritizing user experience at the expense of security can increase sales, though pivoting from passwords is still problematic.

πŸ“– Read

via "Security on TechRepublic".
❌ Volkswagen Giveaway Scam Peddles Ad Networks ❌

The scam is spread via Facebook and WhatsApp messages.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 6 Cloud Security Predictions for 2019 πŸ•΄

How the fast pace of cloud computing adoption in 2018 will dramatically change the security landscape next year.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2016-10502

While generating trusted application id, An integer overflow can occur giving the trusted application an invalid identity in Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835 and SDA660.

πŸ“– Read

via "National Vulnerability Database".
❌ Old-School Bagle Worm Spotted in Modern Spam Campaigns ❌

Bagle.A and Bagle.B date back to 2004.

πŸ“– Read

via "Threatpost | The first stop for security news".