πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ KISS, Cyber & the Humble but Nourishing Chickpea πŸ•΄

The combination of simple, straightforward, and methodical ingredients are the keys to developing a balanced and well-rounded security program.

πŸ“– Read

via "Dark Reading: ".
❌ Cybercriminals Aim for the Super Bowl Goal Posts ❌

Scams, infrastructure attacks, data harvesting and attacks on streamers are all in the offing.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Why you need to use DMARC and SPF on mail servers to prevent phishing and fraud πŸ”

Open-source, industry standard specifications are available to protect your business, but real-world deployment is still lower than optimal.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatpost News Wrap Podcast For Feb. 1 ❌

From Facebook's research app being pulled from iOS devices to a new-found dump of compromised credentials, here are the top news of the week.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2016-10741

In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.

πŸ“– Read

via "National Vulnerability Database".
⚠ FaceTime bug, eavesdropping and digital snooping – what to do? [VIDEO] ⚠

In this week's Naked Security Live video: what to do about microphone-equipped devices in your home?

πŸ“– Read

via "Naked Security".
πŸ” How to secure NGINX with Let's Encrypt πŸ”

If you run NGINX and want to use free certificates, it's possible with Let's Encrypt.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Nest Hack Leaves Homeowner Sleepless in Chicago πŸ•΄

A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-0722

Path Traversal vulnerability in Photo Station versions: 5.7.2 and earlier in QTS 4.3.4, 5.4.4 and earlier in QTS 4.3.3, 5.2.8 and earlier in QTS 4.2.6 could allow remote attackers to access sensitive information on the device.

πŸ“– Read

via "National Vulnerability Database".
❌ Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware ❌

The Remexi spyware has been improved and retooled.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Spectre and Meltdown explained: New variants and more efficient patches πŸ”

Learn about these uniquely dangerous vulnerabilities as TechRepublic's James Sanders discusses up-to-date info on the latest variants and best mitigation strategies to minimize performance impact.

πŸ“– Read

via "Security on TechRepublic".
❌ Houzz Urges Password Resets After Data Breach ❌

The decorating website said that account usernames, passwords and more have been compromised as part of a breach.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” How to lock a user account on Cent OS 7 πŸ”

You can easily prevent unwanted users and attacks from gaining access to your CentOS 7 server.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 28 stories of the week ⚠

From the DNS outage that deleted users' Azure data to the Nest security cam hijacker, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Selling fake likes and follows is illegal, rules New York ⚠

A groundbreaking settlement in New York finds that selling fake likes and followers is illegal.

πŸ“– Read

via "Naked Security".
⚠ FBI burrowing into North Korea’s big bad botnet ⚠

The FBI revealed that it joined the Joanap botnet and started chewing it up from the inside.

πŸ“– Read

via "Naked Security".
⚠ Chrome’s hidden lookalike detection feature battles URL imposters ⚠

Chrome now checks for misspellings of popular URLs and will display a link to the site that it thinks the user might have wanted to visit.

πŸ“– Read

via "Naked Security".
⚠ Security weaknesses in 5G, 4G and 3G could expose users’ locations ⚠

Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user's location.

πŸ“– Read

via "Naked Security".
❌ SpeakUp Linux Backdoor Sets Up for Major Attack ❌

Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ IoT Security's Coming of Age Is Overdue πŸ•΄

The unique threat landscape requires a novel security approach based on the latest advances in network and AI security.

πŸ“– Read

via "Dark Reading: ".