πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Consumers Care About Privacy, but Not Enough to Act on It πŸ•΄

People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.

πŸ“– Read

via "Dark Reading: ".
⚠ Ep. 022 – Plaintext passwords, cryptocoin criminality and the Momo monstrosity [PODCAST] ⚠

Here's the latest episode of the Naked Security podcast - listen now!

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: TLS Markets Flourish on the Dark Web ❌

The certificates are often paired with ancillary products, like Google-indexed β€œaged” domains, after-sale support, web design services and even integration with a range of payment processors.

πŸ“– Read

via "Threatpost".
⚠ Google Photos disables sharing on Android TV ⚠

Two models of Android TVs showed a stream of strangers' Google accounts, along with profile pics, though not the actual photos.

πŸ“– Read

via "Naked Security".
❌ RSA Conference 2019: Microsoft, Google, Twitter on Federal Privacy Regs ❌

Public policy honchos for the tech giants discussed what they would like to see in sweeping GDPR-like federal data privacy legislation.

πŸ“– Read

via "Threatpost".
⚠ Leaky ski helmet speakers expose conversations and data ⚠

Chips 2.0 speakers are the perfect accessory for any on-trend skier. There’s just one problem: Everyone else can listen in too.

πŸ“– Read

via "Naked Security".
πŸ” 3 things you need in a cybersecurity awareness training plan πŸ”

Organizations can change employee security behaviors by creating a strategic plan, according to SANS Security Awareness.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 10 enterprise network mistakes that open the door to hackers πŸ”

At RSA 2019, Paula Januszkiewicz of CQURE explained common infrastructure shortcuts that open the door to hacking.

πŸ“– Read

via "Security on TechRepublic".
⚠ Google reveals BuggyCow macOS security flaw ⚠

Google’s Project Zero researchers have revealed a "high severity" macOS security flaw nicknamed β€˜BuggyCow’ which Apple appears to be in no rush to patch.

πŸ“– Read

via "Naked Security".
❌ RSA Conference: Data-Wiping Cyberattacks Plague Financial Firms ❌

A new report outlines the cyberattacks and threats that financial firms are facing.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: Cryptographers’ Panel Decries Adi Shamir’s Visa Issues ❌

Panelists react to missing noted cryptographer Adi Shamir who was denied a visa to enter the US to attend the RSAC.

πŸ“– Read

via "Threatpost".
πŸ•΄ Fighting Alert Fatigue with Actionable Intelligence πŸ•΄

By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Chrome zero-day – Google says update β€œright this minute” ⚠

When a security expert on the Chrome team says, "update your Chrome installs... like right this minute" - well, here's how to check!

πŸ“– Read

via "Naked Security".
πŸ•΄ It's Time to Rethink Your Vendor Questionnaire πŸ•΄

To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.

πŸ“– Read

via "Dark Reading: ".
❌ RSA Conference 2019: How to Defend Against an AI vs AI β€˜Flash War’ ❌

Offensive cyber attack chains are accelerating rapidly thanks to a combination of artificial intelligence, machine learning and broadening threat landscape.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: The Sky’s the Limit For Satellite Hacks ❌

Satellites are spotted with vulnerabilities and design flaws - and hackers are taking note, researchers report at the RSA Conference.

πŸ“– Read

via "Threatpost".
πŸ” New Insider Threat Report Breaks Down Scenarios, Statistics πŸ”

Verizon's Insider Threat Report breaks down five categories of inside threat actors and outlines 11 steps to reduce risk and defend against malicious insiders.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Meet the New 'Public-Interest Cybersecurity Technologist' πŸ•΄

A grassroots movement is emerging to train high-risk groups and underrepresented communities in cybersecurity protection and skills - all for the public good.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Threat Group Using Old Technique to Run Custom Malware πŸ•΄

Whitefly is exploiting DLL hijacking with considerable success against organizations since at least 2017, Symantec says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-1912

IBM DOORS Next Generation (DNG/RRC) 6.0.2 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152736.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-1911

IBM DOORS Next Generation (DNG/RRC) 5.0 through 5.0.2 and 6.0 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152735.

πŸ“– Read

via "National Vulnerability Database".