πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Android Phones Now Double as Physical Security Keys πŸ•΄

Google debuted a series of security updates at Next 2019, giving users the option to use their phone as a second authentication factor.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Merging Companies, Merging Clouds πŸ•΄

Integrating cloud environments is anything but easy. Evaluating the security risks in doing so must be a starting component of an overall M&A strategy.

πŸ“– Read

via "Dark Reading: ".
πŸ” State Agencies, Department of Human Services Offices, Frequent Targets of Phishing Scams πŸ”

State executive agencies, namely Department of Human Services offices, have increasingly found themselves the victims of successful phishing scams.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” State Agencies, Department of Human Services Offices, Being Hit Hard by Phishing Scams πŸ”

State executive agencies, namely Department of Human Services offices, have increasingly found themselves the victims of successful phishing scams.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ SAS 2019: Joe FitzPatrick Warns of the β€˜$5 Supply Chain Attack’ ❌

At the Security Analyst Summit, Threatpost editor Tara Seals catches up with Joe FitzPatrick, researcher with Securing Hardware, to discuss supply chain threats.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Android Malware Adds Persistence, Targets Australian Banking Customers πŸ•΄

Malware campaign, which finds and exfiltrates a user's contact list and banking credentials, could potentially grow to global proportions.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Senate Bill Would Ban Social Networks' Social Engineering Tricks πŸ•΄

Bill takes aim at all the tricks Facebook uses to convince people to give up their personal data, and all the games that addict kids.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 25% of Phishing Emails Sneak into Office 365: Report πŸ•΄

Researchers analyzed 55.5 million emails and found one out of every 99 messages contains a phishing attack.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Majority of Hotel Websites Leak Guest Booking Info πŸ•΄

Third parties such as ad, search engine, and analytics firms often have access to guest name, address, phone numbers, credit cards and other data, Symantec says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2006-7254

The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2005-3590

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Triton/Trisis Attacks Another Victim πŸ•΄

FireEye Mandiant incident responders reveal a new attack by the hacking group that previously targeted a petrochemical plant in Saudi Arabia in 2017.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why it's cheaper than ever to buy stolen identities on the Dark Web to steal tax refunds πŸ”

With an upfront investment of about $1,000, attackers can more than double their money, according to a report from Carbon Black.

πŸ“– Read

via "Security on TechRepublic".
⚠ App could have let attackers locate and take control of users’ cars ⚠

A smartphone app used to control vehicles across North America left them wide open to attackers, it was revealed this week.

πŸ“– Read

via "Naked Security".
⚠ Ban the use of β€˜dark patterns’ by tech companies, say US lawmakers ⚠

Congressional leaders in the US unveiled a new law this week to ban the use of β€˜dark patterns’ by large online players.

πŸ“– Read

via "Naked Security".
⚠ Toddler locks father out of iPad for 25.5 MILLION minutes, or until 2067 ⚠

A father thought he’d been permanently locked out of his Apple iPad after his young son repeatedly entered an incorrect passcode.

πŸ“– Read

via "Naked Security".
❌ Amazon Auditors Listen to Echo Recordings, Report Says ❌

Amazon is under fire for its privacy policies after a Bloomberg report revealed that the company hires auditors to listen to Echo recordings.

πŸ“– Read

via "Threatpost".
πŸ” Half of organizations don't test their incident response plans πŸ”

Understaffed and overburdened cybersecurity teams are stretched too thin to cover the entire attack surface, according to a Ponemon / IBM report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why IT pros fear employee error, not hackers, will cause the most breaches πŸ”

IT pros are more concerned with user error and malicious insiders than compromised accounts, according to a Gurucul report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ When Your Sandbox Fails πŸ•΄

The sandbox is an important piece of the security stack, but an organization's entire strategy shouldn't rely on its ability to detect every threat. Here's why.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Security: How web forms can steal your bandwidth and harm your brand ⚠

Got a mailing list? Ever signed up for one? Ever stopped to think how a crook could abuse the security-related confirmation process?

πŸ“– Read

via "Naked Security".