πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Bluetooth β€œgas station” warning on Facebook – truth or hoax? [VIDEO] ⚠

Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

πŸ“– Read

via "Naked Security".
⚠ Facebook lets Android users block location tracking ⚠

Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.

πŸ“– Read

via "Naked Security".
❌ Threatpost Poll: Are Password Managers Too Risky? ❌

Weigh in on password managers with our Threatpost poll.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Flash β€œsecurity bypass” list hidden in Microsoft Edge browser ⚠

Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.

πŸ“– Read

via "Naked Security".
⚠ Microsoft fixes DDoS bug in its web server ⚠

Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.

πŸ“– Read

via "Naked Security".
⚠ Pedos pollute YouTube comments on kids’ videos, advertisers flee ⚠

Can YouTube ever keep video comments under control, or it is time to kill off comments altogether?

πŸ“– Read

via "Naked Security".
πŸ” ​5 tips: Choosing the best cloud vendor πŸ”

When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia πŸ•΄

There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Mitigate Advanced Threats, Put People Ahead of Tech πŸ•΄

Preventative technologies are only part of the picture and often come at the expense of the humans behind them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Legislation Builds on California Data Breach Law πŸ•΄

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

πŸ“– Read

via "Dark Reading: ".
❌ Threatpost News Wrap Podcast For Feb. 22 ❌

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Friday Five: 2/22 Edition πŸ”

The DHS plots a move to the cloud, China embraces data protection, and ATM hacking - catch up with the week's top infosec stories with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 6 Tips for Getting the Most from Your VPN πŸ•΄

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

πŸ“– Read

via "Dark Reading: ".
❌ Data Breaches of the Week: Tales of PoS Malware, Latrine Status ❌

U.S. and subcontinent consumers were the most affected by this week's exposure revelations.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Video: HackerOne CEO on the Evolving Bug Bounty Landscape ❌

Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Lessons From the War on Malicious Mobile Apps πŸ•΄

Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Malware Campaign Targets Job Seekers πŸ•΄

LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Gold: Alice and Bob, Caught in a Web of Lies ❌

There was a shocking turn of events in crypto-world.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Phishing Scam Cloaks Malware With Fake Google reCAPTCHA ❌

Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.

πŸ“– Read

via "Threatpost | The first stop for security news".