πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to password protect the GRUB boot loader in Ubuntu πŸ”

Password protecting the GRUB boot loader protects against unwanted rebooting and logging into your system, and stops unwanted users from gaining access to single user mode.

πŸ“– Read

via "Security on TechRepublic".
⚠ NSA might shut down phone snooping program, whatever that means ⚠

We've heard this tale before. This time, it was mentioned by a congressional aide. Also, the NSA released Ghidra, a free reverse-engineering tool.

πŸ“– Read

via "Naked Security".
❌ RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat ❌

When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA.

πŸ“– Read

via "Threatpost".
⚠ Unclosable browser popup! 13-year-old charged for sharing code ⚠

She didn't create it, but she allegedly shared it. That's enough to get in trouble in Japan, with its history of being tough on cyber crime.

πŸ“– Read

via "Naked Security".
πŸ” Iranian Hackers Stole Corporate Secrets From 200 Oil, Gas, Manufacturing Firms πŸ”

The campaign, which counts oil, gas, and heavy machinery manufacturers among its victims, has been responsible for millions of dollars in lost productivity and data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to enable and configure Auditd on CentOS 7 πŸ”

Learn how to install Auditd on CentOS 7 and how to add a new rule to watch for file system changes.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Iranian Hackers Stole Corporate Secrets; 200 Oil, Gas, Manufacturing Firms Targeted πŸ”

The campaign, which counts oil, gas, and heavy machinery manufacturers among its victims, has been responsible for millions of dollars in lost productivity and data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2018-11783

sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Debunking 5 Myths About Zero Trust Security πŸ•΄

cc

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5G cybersecurity concerns and physical challenges: What you need to know πŸ”

Dan Patterson discusses how 5G will enable IoT, AR, VR, 3D renderings, and more. He also talks about the numerous cybersecurity concerns with 5G.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ IoT Anomaly Detection 101: Data Science to Predict the Unexpected πŸ•΄

Yes! You can predict the chance of a mechanical failure or security breach before it happens . Here's how.

πŸ“– Read

via "Dark Reading: ".
❌ RSA Conference 2019: Ultrasound Hacked in Two Clicks ❌

In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.

πŸ“– Read

via "Threatpost".
❌ RSA Conference 2019: Firms Continue to Fail at IoT Security ❌

IoT is growing more popular in the home - and so to are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

πŸ“– Read

via "Threatpost".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How digital transformation affects the people of New York City πŸ”

Dan Patterson spoke with the deputy CTO for the NYC mayor's office about taking a community-centered approach to digital transformation and cybersecurity, as well as its Moonshot Challenge.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How China & Russia Use Social Media to Sway the West πŸ•΄

Researchers break down the differences in how China and Russia use social media to manipulate American audiences.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Twitter, Facebook, NSA Discuss Fight Against Misinformation πŸ•΄

RSA panelists address the delicate technical challenges of combating information warfare online without causing First Amendment freedoms to take collateral damage.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-0192

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

πŸ“– Read

via "National Vulnerability Database".