πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Pre-Installed Android App Impacts Millions with Slew of Malicious Activity ❌

The app was developed by legitimate Chinese manufacturing giant TCL.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Good data in, good data out: How innovation in technology has evolved πŸ”

Xerox's CISO Alissa Abdullah discusses how innovation in technology and security has changed throughout her career.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Good data in, good data out: How innovation in technology has evolved πŸ”

Xerox's CISO Alissa Abdullah discusses how innovation in technology and security has changed throughout her career.

πŸ“– Read

via "Security on TechRepublic".
⚠ Ep. 014 – Rickrolls, Acrobat and zombie hands [PODCAST] ⚠

Here's the latest Naked Security podcast - enjoy!

πŸ“– Read

via "Naked Security".
⚠ Monday review – the hot 22 stories of the week ⚠

From vulnerable 2FA codes to phishing to critical flaws for Adobe Acrobat and Reader, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Facebook exec gets SWATted ⚠

The imposter claimed to be the Facebook exec and said he'd shot his wife, tied up his kids and planted pipe bombs β€œall over the place.”

πŸ“– Read

via "Naked Security".
⚠ USB-C Authentication sounds great, so why are people worried? ⚠

USB-C Authentication could banish USB threats forever, but it might also mean you're tied to buying β€˜approved’ accessories.

πŸ“– Read

via "Naked Security".
⚠ 10 years for Boston Children’s Hospital DDoSer ⚠

Martin Gottesfeld said he wishes he β€œhad done more” than knock out BCH’s network for at least two weeks.

πŸ“– Read

via "Naked Security".
❌ Podcast: Emotet Grows With Fast-Evolving Tactics ❌

Threatpost discusses the future of the Emotet banking trojan with Cylance.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Data Exposed in OXO, Amazon and MongoDB Leaks ❌

Dual data exposures and a wide-scale data leak due to a vulnerable MongoDB database have kicked off 2019 so far.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Shutdown hits government websites as certificates begin to expire ⚠

The US government shutdown is affecting more than just physical sites like national parks and monuments.

πŸ“– Read

via "Naked Security".
πŸ•΄ Advanced Phishing Scenarios You Will Most Likely Encounter This Year πŸ•΄

In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware.

πŸ“– Read

via "Dark Reading: ".
❌ Mozilla Kills Default Support for Adobe Flash in Firefox 69 ❌

Firefox 69 will force users to manually install Adobe Flash as the plugin inches toward end of life.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Ryuk Hauls in $3.7M in β€˜Earnings,’ Adds TrickBot to the Attack Mix ❌

The malware's operator, Grim Spider, could be affiliated with Russian cybercrime rings, according to some -- others say there's no concrete evidence.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Facebook Faces Action From German Watchdog πŸ•΄

German antitrust regulators prepare to require changes from Facebook regarding privacy and personal information.

πŸ“– Read

via "Dark Reading: ".
❌ Hack Allows Escape of Play-with-Docker Containers ❌

Researchers created a proof-of-concept escape of Docker test environment.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Radiflow: New Approach for Classifying OT Attack Flaws πŸ•΄

The firm says risk assessment should begin with understanding attacker taxonomy and continue with vulnerability analysis.

πŸ“– Read

via "Dark Reading: ".
❌ Threatpost Poll: Can We Fix 2FA? ❌

Take our short poll to weigh in on the state of two-factor authentication.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ New year, new career? How some Sophos experts got into cybersecurity ⚠

We asked a number of people working in different roles at Sophos how they made their way into cybersecurity. 1. Music making to malware fighting Sales Engineer, Benedict Jones I graduated from university with a first class BSc honours degree in Sound Technology and Digital Music. I have always pertained a profound interest in music […]

πŸ“– Read

via "Naked Security".
❌ Popular Web-Hosting Platform Bluehost Riddled with Flaws, Researcher Claims ❌

He said that similar flaws were also found in the Dreamhost, HostGator, OVH and iPage web hosting platforms.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Cryptomining Continues to Be Top Malware Threat πŸ•΄

Tools for illegally mining Coinhive, Monero, and other cryptocurrency dominate list of most prevalent malware in December 2018.

πŸ“– Read

via "Dark Reading: ".