πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why Cybersecurity Burnout Is Real (and What to Do About It) πŸ•΄

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Human Negligence to Blame for the Majority of Insider Threats πŸ•΄

In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web - a 20% jump from 2018.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attack Campaign Experiments with Rapid Changes in Email Lure Content πŸ•΄

It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.

πŸ“– Read

via "Dark Reading: ".
⚠ Bluetooth β€œgas station” warning on Facebook – truth or hoax? [VIDEO] ⚠

Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

πŸ“– Read

via "Naked Security".
⚠ Facebook lets Android users block location tracking ⚠

Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.

πŸ“– Read

via "Naked Security".
❌ Threatpost Poll: Are Password Managers Too Risky? ❌

Weigh in on password managers with our Threatpost poll.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Flash β€œsecurity bypass” list hidden in Microsoft Edge browser ⚠

Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.

πŸ“– Read

via "Naked Security".
⚠ Microsoft fixes DDoS bug in its web server ⚠

Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.

πŸ“– Read

via "Naked Security".
⚠ Pedos pollute YouTube comments on kids’ videos, advertisers flee ⚠

Can YouTube ever keep video comments under control, or it is time to kill off comments altogether?

πŸ“– Read

via "Naked Security".
πŸ” ​5 tips: Choosing the best cloud vendor πŸ”

When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia πŸ•΄

There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Mitigate Advanced Threats, Put People Ahead of Tech πŸ•΄

Preventative technologies are only part of the picture and often come at the expense of the humans behind them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Legislation Builds on California Data Breach Law πŸ•΄

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

πŸ“– Read

via "Dark Reading: ".
❌ Threatpost News Wrap Podcast For Feb. 22 ❌

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Friday Five: 2/22 Edition πŸ”

The DHS plots a move to the cloud, China embraces data protection, and ATM hacking - catch up with the week's top infosec stories with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 6 Tips for Getting the Most from Your VPN πŸ•΄

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

πŸ“– Read

via "Dark Reading: ".
❌ Data Breaches of the Week: Tales of PoS Malware, Latrine Status ❌

U.S. and subcontinent consumers were the most affected by this week's exposure revelations.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Video: HackerOne CEO on the Evolving Bug Bounty Landscape ❌

Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Lessons From the War on Malicious Mobile Apps πŸ•΄

Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.

πŸ“– Read

via "Dark Reading: ".