πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ PewDiePie Hackers Launch Second Printer Siege, According to Reports ❌

The hackers behind the attack said they have targeted 100,000 more printers in the latest attack dubbed #PrinterHack2.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Shhhhh! The Secret to Secrets Management πŸ•΄

Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Facebook: Photo API Bug Exposed 6.8M User Photos πŸ•΄

The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn't post.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lax Controls Leave Fortune 500 Overexposed On the Net πŸ•΄

The largest companies in the world have an average of 500 servers and devices accessible from the Internet - and many leave thousands of systems open to attack.

πŸ“– Read

via "Dark Reading: ".
❌ Charming Kitten Iranian Espionage Campaign Thwarts 2FA ❌

The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ [Sponsored Content] The State of Encryption and How to Improve It πŸ•΄

Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.

πŸ“– Read

via "Dark Reading: ".
❌ Automotive Security: It’s More Than Just What’s Under The Hood ❌

True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 5 biggest IoT security failures of 2018 πŸ”

The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious failures of 2018.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Chinese Hackers Stole Classified US Navy Info πŸ•΄

Cyberattacks reportedly targeted US Defense contractor.

πŸ“– Read

via "Dark Reading: ".
πŸ” Brute force and dictionary attacks: A cheat sheet πŸ”

Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader πŸ•΄

Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.

πŸ“– Read

via "Dark Reading: ".
❌ Twitter Draws Data Privacy Concerns with Two New Bugs ❌

The two flaws shed light on heightened concern around user data privacy when it comes to data.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow πŸ•΄

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Readiness Institute Launches New Program for SMBs πŸ•΄

Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Ballistic Missile Defense System Rife with Security Holes ❌

Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Sneaky phishing campaign beats two-factor authentication ⚠

Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure.

πŸ“– Read

via "Naked Security".
⚠ Twitter fixes bug that lets unauthorized apps get access to DMs ⚠

"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.

πŸ“– Read

via "Naked Security".
⚠ Logitech flaw fixed after Project Zero disclosure ⚠

The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.

πŸ“– Read

via "Naked Security".
⚠ Facebook photo API bug exposed users’ unpublished photos ⚠

It affected up to 6.8 million users and up to 1,500 apps. β€œWe're sorry this happened,” said Facebook with what must be acute apology fatigue.

πŸ“– Read

via "Naked Security".
πŸ•΄ 8 Security Tips to Gift Your Loved Ones For the Holidays πŸ•΄

Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.

πŸ“– Read

via "Dark Reading: ".