πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🕳 February Event Spotlight: IAPP Data Protection Intensive: France 2019, Privacy Insight Series Webinars, IAPP CCPA Comprehensive 2019 🕳

<code>Media</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP Data Protection Intensive: France 2019
12 – 13 February  
Paris  </code><code>Join data protection professionals from across Europe for two days of concentrated learning, sharing, and networking at the IAPP Data Protection Intensive: France 2019 in Paris on 12-13 February. All sessions will be delivered by data protection experts in parallel tracksβ€”one in English, the other in French. It is practical advice designed to improve your operational response to the GDPR and prepare you for future challenges.</code><code>TrustArc will be exhibiting and sponsoring the Networking Reception on 12 February. Stop by booth #6 to say hello!</code><code>Register here</code><code>_____________________________________________________________________________</code><code> </code><code>Media</code><code>Privacy Insight Series Webinar
The Path to U.S. – Japan Data Transfer Compliance
February 13 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar  </code><code>Japan’s data protection law, the Act on the Protection of Personal Information (APPI) requires that companies have sufficient data protections for data transfers out of Japan. Since APPI went into effect in May 2017, companies, including subsidiaries of U.S.-headquartered companies in Japan, are liable for any violation and are subject to enforcement.</code><code>APPI recognizes that the APEC Cross Border Privacy Rules (CBPR) system is one mechanism to demonstrate that required data protections are in place. An APEC CBPR Certification can support companies’ compliance efforts with APPI and show their commitment to secure U.S . -Japan data transfer.</code><code>This webinar will cover the following:</code><code>International data transfer requirements under APPI and who they apply to along with how the APEC CBPR system fits in with these requirements</code><code>Introduction to APEC CBPR certification, including benefits in the context of APPI requirements</code><code>Real-world examples from industry experts on how APEC CBPR certification can fit in with your global compliance strategy</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Privacy Insight Series Webinar
Managing Risk & Easing the Pain of Vendor Management
February 20 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar  </code><code>Whether you’re focused on GDPR, CCPA, HIPAA or Privacy Shield – one of the most important components of a privacy and security risk management program is to understand how your third party vendors are handling your data and whether they can maintain compliance. At the same time, you’re struggling to keep up with privacy assessments and security questionnaires about your own data handling practices.</code><code>A regulator may never ask about your GDPR compliance status but your largest customer probably will. Demonstrate your compliance or expand and efficiently scale a vendor management program.</code><code>This webinar will outline:</code><code>Options to demonstrate compliance against multiple regulations or buyer requirements</code><code>Tools and methodology to support privacy and security third party assessments</code><code>Ways to develop an independent validation program and process for ongoing assurance of a risk-based level of supplier compliance</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP CCPA Comprehensive 2019
February 25
Fremont, CA</code><code>Start planning your response to the California Consumer Privacy Act (CCPA) by diving into its details at the IAPP CCPA Comprehensive. This day-long examination of the law will…
πŸ•΄ New Zombie 'POODLE' Attack Bred From TLS Flaw πŸ•΄

Citrix issues update for encryption weakness dogging the popular security protocol.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Law Enforcement Busts Romanian Online Crime Operation πŸ•΄

Twelve members of 20-person group extradited to US to face charges related to theft of millions via fake ads other scams.

πŸ“– Read

via "Dark Reading: ".
❌ Google Boosts Encryption For Low-End Android Devices ❌

Google's Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Help! Need VPN recommendations for Android πŸ”

What VPN would you recommend for an Android user who uses public WiFi quite often and wants to buff up their security?

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2009-5154

An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. There is a default password of meinsm for the admin account.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 24 stories of the week ⚠

From the FBI-supporting DNA kit company, to the privacy bug in gay dating app Jack'd, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Get-rich-quick social media scams are turning teens into money mules ⚠

Data shows that young people are most at risk of this type of fraud, in which they're talked into handing over their bank details.

πŸ“– Read

via "Naked Security".
⚠ What comes after air gaps? DARPA asks world for ideas ⚠

According to DARPA, air gapping computers and data is a security idea that has run its course and urgently needs to be replaced.

πŸ“– Read

via "Naked Security".
⚠ Secret Service busts online car sales crime ring ⚠

They posed as military needing to offload cars before deployment, allegedly posting bogus ads on Craigslist, eBay, and AutoTrader.

πŸ“– Read

via "Naked Security".
⚠ McDonalds app users hatin’ it after being hacked by hungry hamburglars ⚠

At least two users of the McDonalds mobile app aren’t lovin’ it after thieves hijacked their accounts and ordered hundreds of dollars of food for themselves.

πŸ“– Read

via "Naked Security".
⚠ You can now unsend messages in Facebook Messenger ⚠

Facebook Messenger has made available the ability to unsend, or in their words "remove for everyone" your mis-sent messages.

πŸ“– Read

via "Naked Security".
πŸ” How to use SSH to proxy through a Linux jump host πŸ”

Make your networks more secure by using an SSH to proxy through a jump host from one machine to another.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cryptocurrency-stealing Clipper malware caught in Google Play Store, here's how to avoid it πŸ”

Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5 blockchain terms business leaders need to know πŸ”

Blockchain technology is critical to business security, according to a Globant report. Here are the important blockchain terms to get accustomed with.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What the Government Shutdown Teaches Us about Cybersecurity πŸ•΄

As lawmakers face a Friday deadline to prevent the federal government from closing a second time, we examine the cost to the digital domain, both public and private.

πŸ“– Read

via "Dark Reading: ".
⚠ Crypto mirror on the wall, who’s the smartest of them all? ⚠

Can scientists out-perform sports stars, musicians and politicians in recognition and influence? You bet they can!

πŸ“– Read

via "Naked Security".
❌ Managing Enterprise Security After the Data Supernova ❌

It's futile to try to put the data genie back in the bottle. Next best thing is whole-enterprise data visibility.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ First β€˜Clipper’ Malware Discovered on Google Play ❌

A fake MetaMask app is the first instance of this new type of cryptocurrency stealer appearing outside of shady third-party app stores.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns ❌

Three major websites are making data-breach news this week.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Security Pros Agree Military Should Conduct Offensive Hacking πŸ•΄

But it can't operate in a bubble, a new Washington Post study indicates.

πŸ“– Read

via "Dark Reading: ".