๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โŒ Appleโ€™s Shazam App Boots Facebook Ads and Other Third-Party SDKs โŒ

The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ•ด POS Vendor Announces January Data Breach ๐Ÿ•ด

More than 120 restaurants were affected by an incident that exposed customer credit card information.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Separ Malware Plucks Hundreds of Companiesโ€™ Credentials in Ongoing Phish โŒ

An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ•ด Mastercard, GCA Create Small Business Cybersecurity Toolkit ๐Ÿ•ด

A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Researcher: Not Hard for a Hacker to Capsize a Ship at Sea โŒ

Maritime transport still contributes in an important way to the worldโ€™s economy, with on-time shipments influencing everything from commodities availability and spot pricing to the stability of small countries. Unfortunately, capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners. With so many previously outlined ways [โ€ฆ]

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” Best practices for handling gaps in cloud security ๐Ÿ”

Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด As Businesses Move Critical Data to Cloud, Security Risks Abound ๐Ÿ•ด

Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.

๐Ÿ“– Read

via "Dark Reading: ".
โš  Can you really sniff out gas station card skimmers with your phone? โš 

A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesn't help much...

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Insurer Offers GDPR-Specific Coverage for SMBs ๐Ÿ•ด

Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2018-15380

A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster service manager and injecting commands into the bound process. A successful exploit could allow the attacker to run commands on the affected host as the root user. This vulnerability affects Cisco HyperFlex Software releases prior to 3.5(2a).

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2013-7469

Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.

๐Ÿ“– Read

via "National Vulnerability Database".
<b>&#9939; Unsupervised Learning: No. 165 &#9939;</b>

<code>Media</code><code>Unsupervised Learning is my weekly show where I spend 5-20 hours finding the most interesting stories in security, technology, and humans, which I then curate into a 30-minute podcast & companion newsletter.</code><code>The goal is to catch you up on current events, show you the best content from around the web, and hopefully give you something to think about as well.</code><code>Subscribe to the Newsletter or Podcast</code><code>&#128737;&#65039; Security News


&#128293; The OpenAI team created an algorithm that can write news stories so well that they are refusing to release it due to potential use to create fake news. I get what theyโ€™re doing, but the odds of this not being co-developed by many other groups is close to zero over a span of months. Hereโ€™s an example of a fake story it wrote about national security, and it did this on its second try with just a few words of seeding by a human. Link

People are concerned that Twitter may not be actually deleting DMs when you delete them. Someone pulled their data archive from Twitter and found their own deleted DMs. Itโ€™s a good reminder that itโ€™s a good policy to just consider anything you do online to be permanent. Link

Trend Micro and the Ponemon Institute created a Cyber Risk Index, which ranks from -10 to 10. Strangely, the lower the number the better, even though itโ€™s called a Risk Index. And if you put that in a graph from left to right, the right side is better than the left side. I couldnโ€™t even get into the way they built the numbers because Iโ€™m forced to assume that process was as bad as the interface. The whole purpose of a system like this is to be used by others, so how could you possibly make such bad choices on the UI? Link

Someone found an open Chinese database online that was being used to track the location of millions of Uyghurs in the country. Between this, the re-education camp, the mass-surveillance and social credit system, the nation-wide censorship firewall, and their colonization of Africa, itโ€™s obvious theyโ€™re willing to do anything to win at this real-life game of Civiilization. Theโ€™ve become morally belligerent. Link

Drones will soon require visible license plates. Link

Switzerland is doing a bug bounty on their e-voting system. Link

The Pentagon is worried about China and Russia fielding ground-based lasers that can blind and otherwise disable U.S. satellites. Link

Advisories: Ubiquiti Device DDoS Potential, 75 Adobe Vulnerabilities, Android App Tracking, SAP HANA,

Leaks: 620 Million Records For Sale on Dark Web


&#9881;&#65039; Technology News


If you refresh this website youโ€™ll get a human face, except theyโ€™re not real humansโ€”theyโ€™re AI generated. Importantly, itโ€™s not a collection of pre-made images getting loaded. Theyโ€™re all generated on the fly. Link

Chinese phones now make up a third of the European market, and Huawei has the top position. Link

One in six Americans wear a smartwatch. Link


&#128103;&#127996;  Human News


Student debt thatโ€™s 90 or more days delinquent is now at $166 billion dollarsโ€”which is an all-time high. Link

Men who could do more than 40 push-ups had a 96% reduced risk of cardiovascular disease relative to men who could do less than 10, over a ten-year study. Link

Mars Rover Opportunityโ€™s last words were, โ€œMy battery is low and itโ€™s getting dark.โ€ It was a little robot that was only supposed to work for 90 days, but it soldiered on for 15 years. And after not being able to raise her after many attempts, they sent her Billie Hollidayโ€™s Iโ€™ll Be Seeing You. Itโ€™s strange how I get emotional about such things, but Iโ€™ll miss her. I hope to be able to watch when we revive her once on the planet. Link

NASA and ESA are planning a mission to deflect an astroid. Link


&#128161; Ideas, Trends, & Analysis


The Rise of the Corporate Technology Ecosystem โ€” My new essay on how corporations will soon become our universal and subscription-basedโ€ฆ
โš  Sorry, we didnโ€™t mean to keep that secret microphone a secret, says Google โš 

It's been off by default, Google says - not much consolation to those who don't cotton to the notion of a "secret" listening gadget.

๐Ÿ“– Read

via "Naked Security".
โš  Hacker Lauri Love denied bid to get computers back โš 

Hacker Lauri Love has failed to get his computers back six years after UKโ€™s National Crime Agency took them as part of a criminal investigation.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” 5 workplace technologies that cause the most employee data breaches ๐Ÿ”

Some 83% of US security professionals said employees have accidently exposed sensitive customer information, according to an Egress survey.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ 19-Year-Old WinRAR Flaw Plagues 500 Million Users โŒ

Users of the popular file-compression tool are urged to immediately update after a serious code-execution flaw was found in WinRAR.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
โš  Password managers leaking data in memory, but you should still use one โš 

Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Security Analysts Are Only Human ๐Ÿ•ด

SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.

๐Ÿ“– Read

via "Dark Reading: ".
โŒ Highly Critical Drupal RCE Flaw Affects Millions of Websites โŒ

Admins should update immediately to fix a remote code-execution vulnerability.

๐Ÿ“– Read

via "Threatpost | The first stop for security news".
๐Ÿ” How to regenerate certificates on VMware host servers ๐Ÿ”

Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to set the AppArmor mode for a service in Ubuntu Server ๐Ÿ”

If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.

๐Ÿ“– Read

via "Security on TechRepublic".