πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to generate SSH keys on macOS Mojave πŸ”

macOS is capable of working with SSH keys. Jack Wallen shows you how to generate the necessary keys and copy them to a server.

πŸ“– Read

via "Security on TechRepublic".
❌ MAGA β€˜Safe Space’ App Developer Threatens Security Researcher ❌

The mobile app, dubbed a "Yelp for Conservatives," was found with an open API leaking reams of user data.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-17937

gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-2254

Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to capture and change patch loading information resulting in the deletion of directory files and compromise of system functions when loading a patch.

πŸ“– Read

via "National Vulnerability Database".
❌ Intel Windows 10 Graphics Drivers Riddled With Flaws ❌

Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code code execution.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'SimBad': Android Adware Hits 210 Apps with 150M Downloads πŸ•΄

Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ IoT Anomaly Detection 101: Data Science to Predict the Unexpected πŸ•΄

Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.

πŸ“– Read

via "Dark Reading: ".
πŸ” Lawmakers See California Consumer Privacy Act As Basis for Federal Law πŸ”

In a Senate Judiciary hearing on Tuesday, lawmakers discussed the impact of California Consumer Privacy Act and how the law should set the stage for a federal privacy bill.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Enterprise Cloud Infrastructure a Big Target for Cryptomining Attacks πŸ•΄

Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ GPS Spoof Hits Geneva Motor Show πŸ•΄

Incident leaves GPS units showing a location in England and a date 17 years in the future.

πŸ“– Read

via "Dark Reading: ".
❌ Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested ❌

A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.

πŸ“– Read

via "Threatpost".
πŸ•΄ Autism, Cybercrime, and Security's Skill Struggle πŸ•΄

People on the autism spectrum often possess traits that could help them succeed in cybersecurity - providing they don't fall into cybercrime first.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Three In Five Politicians' Websites Worldwide Don't Use HTTPS πŸ•΄

Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Three In Five Politicians' Websites Worldwide Don't Use HTTPS πŸ•΄

Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2018-0389

A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Malware Shows Marketing Polish πŸ•΄

A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! Microsoft’s March 2019 Patch Tuesday is here ⚠

If you were among the millions of users who updated Chrome last week to dodge a zero-day exploit, Microsoft has something for you in this month’s Patch Tuesday.

πŸ“– Read

via "Naked Security".
⚠ Google needs breaking up, says news chief ⚠

And Oracle accused Google of creating shadow profiles of even non-users. Theirs are just two of 85 responses to an Australian inquiry.

πŸ“– Read

via "Naked Security".
❌ Insider Threats Get Mean, Nasty and Very Personal ❌

Increasingly, attackers are targeting the most vulnerable people inside companies and exploiting their weaknesses.

πŸ“– Read

via "Threatpost".
πŸ” Businesses don't get how AI cybersecurity tools work, but plan to use them anyway πŸ”

Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cryptocurrency mining attacks still major security risk, despite closure of Coinhive πŸ”

Cryptojacking attacks can be executed in more ways than JavaScript files in browsers, and cryptocurrency mining is moving to cloud services, according to AT&T Cybersecurity.

πŸ“– Read

via "Security on TechRepublic".