πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Inside Cyber Battlefields, the Newest Domain of War πŸ•΄

In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.

πŸ“– Read

via "Dark Reading: ".
⚠ Spyware app exposes private photos, hosting provider steps in ⚠

A hosting company has taken down a database owned by a mobile spying app after it was found displaying phone owners' intimate images online.

πŸ“– Read

via "Naked Security".
πŸ” Is crowdsourcing cybersecurity the answer to CISOs' problems? πŸ”

More than half of organizations now run bug bounty and other crowdsourced options to avoid data breaches, according to a Bugcrowd report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Employee mistakes and system errors are a larger threat to data security than hackers or insiders πŸ”

Employee mistakes were ranked as the highest risk in the 2019 Global Encryption Trends Study, though employee-owned devices on company networks deserve more security scrutiny.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why you should never allow your web browser to save your passwords πŸ”

When a web browser like Chrome, Firefox or Safari is allowed to store passwords, you're putting your network security at risk.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Tidying Expert Marie Kondo: Cybersecurity Guru? πŸ•΄

The "KonMari" method of decluttering can be a huge step toward greater security, according to a growing number of executives.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Everything I Needed to Know About Third-Party Risk Management, I Learned from Meet the Parents πŸ•΄

How much do you trust your vendors? You don't have to hook them up to a polygraph machine because there are better ways to establish trust.

πŸ“– Read

via "Dark Reading: ".
❌ Gamers Urged to Patch Critical Bugs in GOG Galaxy ❌

Video game digital distribution platform GOG Galaxy Games has patched two critical privilege escalation flaws that could allow arbitrary code execution.

πŸ“– Read

via "Threatpost".
⚠ Is your e-commerce site being used to test stolen card data? ⚠

If you're running Magento you should be on the look out for hackers testing stolen card data - it could get your PayPal account suspended.

πŸ“– Read

via "Naked Security".
⚠ β€œTwitter 2007 multicolor” hoax – debunk it, don’t spread it! ⚠

Hoaxers are saying you can unlock colorful new "features" in Twitter, but you'll probably lock yourself out instead.

πŸ“– Read

via "Naked Security".
❌ Lazarus Group Widens Tactics in Cryptocurrency Attacks ❌

MacOS users, as well as Windows, are in the cross-hairs, especially those based in South Korea.

πŸ“– Read

via "Threatpost".
πŸ” Even if your data is stored in the cloud, you need to back it up πŸ”

Misconceptions about fault-tolerance of data in the cloud is leading to IT professionals not safely backing up mission-critical business data.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Tackles IoT Security with New Azure Updates πŸ•΄

The Azure Security Center for IoT provides teams with an overview of IoT devices and helps monitor their security properties.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Enterprise Data Encryption Hits All-time High πŸ•΄

A new report by the Ponemon Institute shows 45% of organizations have a comprehensive encryption policy in place.

πŸ“– Read

via "Dark Reading: ".
πŸ” Unpatched vulnerability in MikroTik RouterOS enables easily exploitable denial of service attack πŸ”

Despite having nearly a year to address the vulnerability, no patch is available for a critical vulnerability, leaving network admins no alternative to disabling IPv6 support.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 45 Percent of Orgs Have Encryption Plan in Place πŸ”

A Ponemon Institute report, published today, says the biggest driver to encryption is organizations who want to protect enterprise intellectual property and consumer personal information.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Quantum Computing and Code-Breaking πŸ•΄

Prepare today for the quantum threats of tomorrow.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Man Pleads Guilty to Hacking Apple Accounts of NFL & NBA Players, Rappers πŸ•΄

Dozens of pro athletes and musicians fell for a phishing scam that pilfered their Apple accounts and credit cards.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 40% of Organizations Not Doing Enough to Protect Office 365 Data πŸ•΄

By not using third-party data backup tools, companies are leaving themselves open to attack, a new report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Android Trojan Targets 100+ Banking Apps πŸ•΄

'Gustuff' also designed to steal from cryptocurrency wallets, payment services, e-commerce apps.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Microsoft Takes Down 99 Hacker-Controlled Websites πŸ•΄

A judge granted Microsoft the injunction allowing them to disrupt a network of sites operated by an Iranian-linked group of hackers.

πŸ“– Read

via "Dark Reading: ".