πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook denies sharing private messages without user knowledge ⚠

Facebook hit back at press reports this week that highlighted a deep network of privileged data-sharing partnerships between the social media company and other large organisations.

πŸ“– Read

via "Naked Security".
πŸ” Top 5 highest-paying tech jobs of 2019 πŸ”

These tech roles will pay the most and be the most heavily recruited this year, according to Scout Exchange.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft IE Zero Day Gets Emergency Patch ❌

Microsoft issued an out-of-band patch for a zero day bug in its Internet Explorer browser.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Facebook Admits Giving Partners Access to Messages ❌

A Facebook partnership with Netflix, Dropbox, Spotify, and Royal Bank of Canada gave them access to messages.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Amazon Sends 1,700 Alexa Voice Recordings to a Random Person ❌

The intimate recordings paint a detailed picture of a man's life.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Automating a DevOps-Friendly Security Policy πŸ•΄

There can be a clash of missions between security and IT Ops teams, but automation can help.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 ways to protect your employees' inboxes from phishing threats πŸ”

Some 42% of companies say employees have fallen victim to a phishing attack, according to EdgeWave. Here's how to keep them safe.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 2018 In the Rearview Mirror πŸ•΄

Among this year's biggest news stories: epic hardware vulnerabilities, a more lethal form of DDoS attack, Olympic 'false flags,' hijacked home routers, fileless malware - and a new world's record for data breaches.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-9704

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, There is no synchronization between msm_vb2 buffer operations which can lead to use after free.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Hackers Bypass Gmail, Yahoo 2FA at Scale πŸ•΄

A new Amnesty International report explains how cyberattackers are phishing second-factor authentication codes sent via SMS.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Indicts 2 APT 10 Members for Years-Long Hacking Campaign πŸ•΄

In an indictment unsealed this morning, the US ties China's state security agency to a widespread campaign of personal and corporate information theft.

πŸ“– Read

via "Dark Reading: ".
πŸ” Amazon sent private Alexa voice interactions from Echo smart speaker to the wrong customer πŸ”

After one German user requested a copy of their Alexa voice history under the GDPR, he got another user's data in the process.

πŸ“– Read

via "Security on TechRepublic".
⚠ Drones shut down major international airport ⚠

A drone operator has repeatedly flown two (UAVs close to the runway, grounding flights at the airport since last night.

πŸ“– Read

via "Naked Security".
<b>&#9000; Feds Charge Three in Mass Seizure of Attack-for-hire Services &#9000;</b>

<code>Authorities in the United States this week brought criminal hacking charges against three men as part of an unprecedented, international takedown targeting 15 different β€œbooter” or β€œstresser” sites β€” attack-for-hire services that helped paying customers launch tens of thousands of digital sieges capable of knocking Web sites and entire network providers offline.</code><code>Media</code><code>The seizure notice appearing on the homepage this week of more than a dozen popular β€œbooter” or β€œstresser” DDoS-for-hire Web sites.</code><code>As of Thursday morning, a seizure notice featuring the seals of the U.S. Justice Department, FBI and other law enforcement agencies appeared on the booter sites, including:</code><code>anonsecurityteam[.]com
booter[.]ninja
bullstresser[.]net
critical-boot[.]com
defcon[.]pro
defianceprotocol[.]com
downthem[.]org
layer7-stresser[.]xyz
netstress[.]org
quantumnstress[.]net
ragebooter[.]com
request[.]rip
str3ssed[.]me
torsecurityteam[.]org
vbooter[.]org</code><code>Booter sites are dangerous because they help lower the barriers to cybercrime, allowing even complete novices to launch sophisticated and crippling attacks with the click of a button.</code><code>Cameron Schroeder, assistant U.S. attorney for the Central District of California, called this week’s action the largest simultaneous seizure of booter service domains ever.</code><code>β€œThis is the biggest action U.S. law enforcement has taken against booter services, and we’re doing this in cooperation with a large number of industry and foreign law enforcement partners,” Schroeder said.</code><code>Booter services are typically advertised through variety of methods, including Dark Web forums, chat platforms and even youtube.com. They accept payment via PayPal, Google Wallet, and/or cryptocurrencies, and subscriptions can range in price from just a few dollars to several hundred per month. The services are priced according to the volume of traffic to be hurled at the target, the duration of each attack, and the number of concurrent attacks allowed.</code><code>Purveyors of stressers and booters claim they are not responsible for how customers use their services, and that they aren’t breaking the law because β€” like most security tools β€” stresser services can be used for good or bad purposes. For example, all of the above-mentioned booter sites contained wordy β€œterms of use” agreements that required customers to agree they will only stress-test their own networks β€” and that they won’t use the service to attack others.</code><code>But experts say today’s announcement shreds that virtual fig leaf, and marks several important strategic shifts in how authorities intend to prosecute booter service operators going forward.</code><code>β€œThis action is predicated on the fact that running a booter service itself is illegal,” said Allison Nixon, director of security research at Flashpoint, a security firm based in New York City. β€œThat’s a slightly different legal argument that has been made in the past against other booter owners.”</code><code>For one thing, the booter services targeted in this takedown advertised the ability to β€œresolve” or determine the true Internet address of a target. This is especially useful for customers seeking to harm targets whose real address is hidden behind mitigation services like Cloudflare (ironically, the same provider used by most of these booter services to withstand attacks by competing booter services).</code><code>Some resolvers also allowed customers to determine the Internet address of a target using nothing more than the target’s Skype username.</code><code>β€œYou don’t need to use a Skype resolver just to attack yourself,” assistant U.S. Attorney Schroeder said. β€œClearly, the people running these booter services know their services are being used not by people targeting their own infrastructure, and have built in capabilities that…
πŸ•΄ How to Optimize Security Spending While Reducing Risk πŸ•΄

Risk scoring is a way of getting everyone on the same page with a consistent, reliable method of gathering and analyzing security data.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Indicts China-Backed Duo for Massive, Years-Long Spy Campaign ❌

The homeland security implications are significant: the two, working with Beijing-backed APT10, allegedly stole sensitive data from orgs like the Navy and NASA.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Huawei Router Flaw Leaks Default Credential Status ❌

It makes it simple for attackers to find devices to take over and add to botnets.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Russian infowar: A reminder your data is being bought and sold πŸ”

Dan Patterson discusses the wake-up call provided by new reports for the Senate that detail Russia's pervasive interference in the 2016 presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Russian infowar: A reminder your data is being bought and sold πŸ”

Dan Patterson discusses the wake-up call provided by new reports for the Senate that detail Russia's pervasive interference in the 2016 presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Attackers Use Scripting Flaw in Internet Explorer, Forcing Microsoft Patch πŸ•΄

Microsoft issues an emergency update to its IE browser after researchers notified the company that a scripting engine flaw is being used to compromised systems.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security 101: How Businesses and Schools Bridge the Talent Gap πŸ•΄

Security experts share the skills companies are looking for, the skills students are learning, and how to best find talent you need.

πŸ“– Read

via "Dark Reading: ".