πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook password crisis – what to do? [VIDEO] ⚠

Watch this special edition of Naked Security Live - we answer the questions people have been asking us, like "Should I stay or should I go?"

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-10743

hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-3965

Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 29 stories of the week ⚠

From an ex-employee from IT hell to Window 7's upcoming patchocalypse, and everything in between. It's weekly roundup time!

πŸ“– Read

via "Naked Security".
⚠ New ratings point to keyless cars that can stand up to relay attacks ⚠

Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.

πŸ“– Read

via "Naked Security".
⚠ Update now! WordPress hackers target Easy WP SMTP plugin ⚠

Two hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.

πŸ“– Read

via "Naked Security".
⚠ Thousands of API and cryptographic keys leaking on GitHub every day ⚠

Researchers have found that one of the most popular source code repositories in the world is still housing thousands of publicly accessible user credentials.

πŸ“– Read

via "Naked Security".
πŸ” Hacking Cars For Fun and Profit at Pwn2Own πŸ”

Web browsers, virtualization software, even cars  – nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Why site reliability engineers face more security incidents and higher stress levels πŸ”

Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why 61% of CIOs believe employees maliciously leak data πŸ”

One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to stop remote workers from causing a security incident: 3 tips πŸ”

Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.

πŸ“– Read

via "Security on TechRepublic".
❌ FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors ❌

The contractor with whom it shared the data has a vulnerable, unpatched network.

πŸ“– Read

via "Threatpost".
πŸ•΄ A Glass Ceiling? Not in Privacy πŸ•΄

According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 business concerns about public cloud applications πŸ”

Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist πŸ•΄

In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.

πŸ“– Read

via "Dark Reading: ".
❌ Some ASUS Updates Drop Backdoors on PCs in β€˜Operation ShadowHammer’ ❌

The attack appears to be associated with a China-backed APT actor.

πŸ“– Read

via "Threatpost".
πŸ” How to install OpenSSH on Windows 10 to encrypt network communications πŸ”

Learn how to use SSH natively within Windows 10 to secure communications between network devices.

πŸ“– Read

via "Security on TechRepublic".
❌ Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks ❌

Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.

πŸ“– Read

via "Threatpost".
πŸ•΄ IT Leaders, Employees Divided on Data Security πŸ•΄

Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.

πŸ“– Read

via "Dark Reading: ".
⚠ Medtronic cardiac implants can be hacked, FDA issues alert ⚠

Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).

πŸ“– Read

via "Naked Security".
❌ Malware Payloads Hide in Images: Steganography Gets a Reboot ❌

Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.

πŸ“– Read

via "Threatpost".