πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia πŸ•΄

There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Mitigate Advanced Threats, Put People Ahead of Tech πŸ•΄

Preventative technologies are only part of the picture and often come at the expense of the humans behind them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Legislation Builds on California Data Breach Law πŸ•΄

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

πŸ“– Read

via "Dark Reading: ".
❌ Threatpost News Wrap Podcast For Feb. 22 ❌

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Friday Five: 2/22 Edition πŸ”

The DHS plots a move to the cloud, China embraces data protection, and ATM hacking - catch up with the week's top infosec stories with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 6 Tips for Getting the Most from Your VPN πŸ•΄

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

πŸ“– Read

via "Dark Reading: ".
❌ Data Breaches of the Week: Tales of PoS Malware, Latrine Status ❌

U.S. and subcontinent consumers were the most affected by this week's exposure revelations.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Video: HackerOne CEO on the Evolving Bug Bounty Landscape ❌

Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Lessons From the War on Malicious Mobile Apps πŸ•΄

Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Malware Campaign Targets Job Seekers πŸ•΄

LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.

πŸ“– Read

via "Dark Reading: ".
❌ Reddit Gold: Alice and Bob, Caught in a Web of Lies ❌

There was a shocking turn of events in crypto-world.

πŸ“– Read

via "Threatpost | The first stop for security news".
❌ Phishing Scam Cloaks Malware With Fake Google reCAPTCHA ❌

Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.

πŸ“– Read

via "Threatpost | The first stop for security news".
ATENTIONβ€Ό New - CVE-2014-10079

In Vembu StoreGrid 4.4.x, the front page of the server web interface leaks the private IP address in the "ipaddress" hidden form value of the HTML source code, which is disclosed because of incorrect processing of an index.php/ trailing slash.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10078

Vembu StoreGrid 4.4.x has XSS in interface/registercustomer/onlineregsuccess.php, interface/registerreseller/onlineregfailure.php, interface/registerclient/onlineregfailure.php, and interface/registercustomer/onlineregfailure.php.

πŸ“– Read

via "National Vulnerability Database".
⚠ Nike’s $350 β€œBack to the Future” trainers crash, have feet of brick ⚠

Have you ever needed to boot a shoe that was a brick? Owners of Nike's $350 "self-lacing" trainers say they have.

πŸ“– Read

via "Naked Security".
πŸ” How to cloud-enable Enpass Password Manager πŸ”

Jack Wallen shows you how to combine Enpass and Dropbox into a perfect, cloud-ready password manager.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to password protect the GRUB Boot Loader In Ubuntu πŸ”

Although Linux is a very secure operating system, there are steps you can take to make it even more one. One simple step is password protecting the GRUB bootloader. Jack Wallen shows you h

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to copy a file between two remote SSH servers πŸ”

SSH has a lot of tricks up its sleeve, one of which is the ability to copy files between two remote servers. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to view passwords in Android Chrome πŸ”

If you can't remember a password for a website you know you've had Chrome save, Jack Wallen shows you how you can view it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install the OpenVAS Security Audit Tool on Ubuntu Server 18.04 πŸ”

Jack Wallen walks you through the process of installing the open source security audit tool, OpenVAS, on the Ubuntu Server platform.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 23 stories of the week ⚠

From leaky password managers to nearly 100 million new stolen data records, and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".