πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business πŸ•΄

Enterprises are struggling with familiar old security challenges as a result, new survey shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Universities Get Schooled by Hackers πŸ•΄

Colleges and universities are prime targets for criminals due to huge sets of personal information and security that is weaker than in many businesses.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! WordPress 5.0.1 release fixes seven flaws ⚠

Don't delay, update your Wordpress website today.

πŸ“– Read

via "Naked Security".
⚠ Kanye West tops the charts for year’s worst password pratfall ⚠

Kanye, please keep your "all zeroes! all the time!" password away from the media. And Nutella? No, "Nutella" is NOT a good password.

πŸ“– Read

via "Naked Security".
⚠ Facebook has filed patents to predict our future locations ⚠

One such use would be to pre-stuff our devices with ads and other content before we wander into a Wi-Fi dead zone.

πŸ“– Read

via "Naked Security".
⚠ YouTube is reading text in users’ videos ⚠

Google keeps tabs on much of your activity. Now, it turns out that its YouTube service is also reading what’s in your videos too.

πŸ“– Read

via "Naked Security".
πŸ” Google is reading text in YouTube videos for search crawling without user consent πŸ”

Videos uploaded as private or unlisted are subject to being crawled, but Google's documentation does not acknowledge this behavior at all.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybercriminals Change Tactics to Outwit Machine-Learning Defense πŸ•΄

The rise in machine learning for security has forced criminals to rethink how to avoid detection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2019 Attacker Playbook πŸ•΄

Security pundits predict the ways that cybercriminals, nation-state actors, and other attackers will refine their tactics, techniques, and procedures in the coming year.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Retailers: Avoid the Hackable Holidaze πŸ•΄

The most wonderful time of the year? Sure, but not if your business and customers are getting robbed.

πŸ“– Read

via "Dark Reading: ".
❌ Save the Children Federation Duped in $1M Scam ❌

A business email compromise campaign cost the Save the Children Federation $1 million.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Logitech Keystroke Injection Flaw Went Unaddressed for Months ❌

The flaw allows a remote attacker to gain full access over a machine.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 2019 cloud security predictions πŸ”

The smart attack era is upon us. Learn how AI, machine learning, IT process automation and a bit of common sense will help our cloud security.

πŸ“– Read

via "Security on TechRepublic".
❌ Facebook Flaw Exposes Private Photos for 6.8M Users ❌

The bug allowed 1,500 apps built by 876 developers to view users' unposted "draft" photos.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ WordPress 5.0 Patched to Fix Serious Bugs ❌

One bug accidentally allowed Google to index user passwords.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Who Are You, Really? A Peek at the Future of Identity πŸ•΄

Experts dive into the trends and challenges defining the identity space and predict how online identities will change in years to come.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Iranian Hackers Target Nuclear Experts, US Officials πŸ•΄

Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran.

πŸ“– Read

via "Dark Reading: ".
❌ Electric Vehicle Charging Stations Open to IoT Attacks ❌

Flaws could allow an attacker to stop or start a home charging station, or even change the current in order to start a fire.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Email Bomb Threats Follow Sextortion Playbook πŸ•΄

Yesterday's wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried "sextortion" and personal threats, Talos researchers say.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 19 stories of the week ⚠

From a massive WordPress botnot to the Dark Web goldmine busted by Europol, and everything in between. It's time for your weekly roundup.

πŸ“– Read

via "Naked Security".
⚠ Fake face fools fones ⚠

Forbes has added to the ever-growing pantheon of ways to trick biometrics by printing a 3D head and using it to break into Android phones.

πŸ“– Read

via "Naked Security".