πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ [Sponsored Content] The State of Encryption and How to Improve It πŸ•΄

Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.

πŸ“– Read

via "Dark Reading: ".
❌ Automotive Security: It’s More Than Just What’s Under The Hood ❌

True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 5 biggest IoT security failures of 2018 πŸ”

The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious failures of 2018.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Chinese Hackers Stole Classified US Navy Info πŸ•΄

Cyberattacks reportedly targeted US Defense contractor.

πŸ“– Read

via "Dark Reading: ".
πŸ” Brute force and dictionary attacks: A cheat sheet πŸ”

Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader πŸ•΄

Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.

πŸ“– Read

via "Dark Reading: ".
❌ Twitter Draws Data Privacy Concerns with Two New Bugs ❌

The two flaws shed light on heightened concern around user data privacy when it comes to data.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow πŸ•΄

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cyber Readiness Institute Launches New Program for SMBs πŸ•΄

Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Ballistic Missile Defense System Rife with Security Holes ❌

Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Sneaky phishing campaign beats two-factor authentication ⚠

Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is equally secure.

πŸ“– Read

via "Naked Security".
⚠ Twitter fixes bug that lets unauthorized apps get access to DMs ⚠

"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.

πŸ“– Read

via "Naked Security".
⚠ Logitech flaw fixed after Project Zero disclosure ⚠

The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.

πŸ“– Read

via "Naked Security".
⚠ Facebook photo API bug exposed users’ unpublished photos ⚠

It affected up to 6.8 million users and up to 1,500 apps. β€œWe're sorry this happened,” said Facebook with what must be acute apology fatigue.

πŸ“– Read

via "Naked Security".
πŸ•΄ 8 Security Tips to Gift Your Loved Ones For the Holidays πŸ•΄

Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.

πŸ“– Read

via "Dark Reading: ".
❌ Newsmaker Interview: Troy Mursch on Top Botnet Trends ❌

MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why 2019 will introduce stricter privacy regulation πŸ”

Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.

πŸ“– Read

via "Security on TechRepublic".
❌ WSJ Webpage Defaced to Support PewDiePie ❌

The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why cryptojacking will become an even larger problem in 2019 πŸ”

Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How to Engage Your Cyber Enemies πŸ•΄

Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.

πŸ“– Read

via "Dark Reading: ".