πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Bluetooth β€œgas station” warning on Facebook – truth or hoax? [VIDEO] ⚠

Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

πŸ“– Read

via "Naked Security".
⚠ Facebook lets Android users block location tracking ⚠

Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.

πŸ“– Read

via "Naked Security".
❌ Threatpost Poll: Are Password Managers Too Risky? ❌

Weigh in on password managers with our Threatpost poll.

πŸ“– Read

via "Threatpost | The first stop for security news".
⚠ Flash β€œsecurity bypass” list hidden in Microsoft Edge browser ⚠

Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.

πŸ“– Read

via "Naked Security".
⚠ Microsoft fixes DDoS bug in its web server ⚠

Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.

πŸ“– Read

via "Naked Security".
⚠ Pedos pollute YouTube comments on kids’ videos, advertisers flee ⚠

Can YouTube ever keep video comments under control, or it is time to kill off comments altogether?

πŸ“– Read

via "Naked Security".
πŸ” ​5 tips: Choosing the best cloud vendor πŸ”

When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia πŸ•΄

There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Mitigate Advanced Threats, Put People Ahead of Tech πŸ•΄

Preventative technologies are only part of the picture and often come at the expense of the humans behind them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Legislation Builds on California Data Breach Law πŸ•΄

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

πŸ“– Read

via "Dark Reading: ".
❌ Threatpost News Wrap Podcast For Feb. 22 ❌

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Friday Five: 2/22 Edition πŸ”

The DHS plots a move to the cloud, China embraces data protection, and ATM hacking - catch up with the week's top infosec stories with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 6 Tips for Getting the Most from Your VPN πŸ•΄

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

πŸ“– Read

via "Dark Reading: ".
❌ Data Breaches of the Week: Tales of PoS Malware, Latrine Status ❌

U.S. and subcontinent consumers were the most affected by this week's exposure revelations.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Video: HackerOne CEO on the Evolving Bug Bounty Landscape ❌

Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Lessons From the War on Malicious Mobile Apps πŸ•΄

Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Malware Campaign Targets Job Seekers πŸ•΄

LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Gold: Alice and Bob, Caught in a Web of Lies ❌

There was a shocking turn of events in crypto-world.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Phishing Scam Cloaks Malware With Fake Google reCAPTCHA ❌

Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2014-10079

In Vembu StoreGrid 4.4.x, the front page of the server web interface leaks the private IP address in the "ipaddress" hidden form value of the HTML source code, which is disclosed because of incorrect processing of an index.php/ trailing slash.

πŸ“– Read

via "National Vulnerability Database".