πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Amazon Auditors Listen to Echo Recordings, Report Says ❌

Amazon is under fire for its privacy policies after a Bloomberg report revealed that the company hires auditors to listen to Echo recordings.

πŸ“– Read

via "Threatpost".
πŸ” Half of organizations don't test their incident response plans πŸ”

Understaffed and overburdened cybersecurity teams are stretched too thin to cover the entire attack surface, according to a Ponemon / IBM report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why IT pros fear employee error, not hackers, will cause the most breaches πŸ”

IT pros are more concerned with user error and malicious insiders than compromised accounts, according to a Gurucul report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ When Your Sandbox Fails πŸ•΄

The sandbox is an important piece of the security stack, but an organization's entire strategy shouldn't rely on its ability to detect every threat. Here's why.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Security: How web forms can steal your bandwidth and harm your brand ⚠

Got a mailing list? Ever signed up for one? Ever stopped to think how a crook could abuse the security-related confirmation process?

πŸ“– Read

via "Naked Security".
πŸ” Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi πŸ”

Public Wi-Fi is rife with security risks, and cybersecurity professionals aren't taking any chances, according to a Lastline report.

πŸ“– Read

via "Security on TechRepublic".
❌ SAS 2019: Fake News Peddlers Adopt Clever New Trick to Fool Facebook, Twitter ❌

At SAS 2019, Recorded Future CTO discusses a new kind of high-profile influence campaign spotted using a new technique: Old news.

πŸ“– Read

via "Threatpost".
πŸ” What is a SQL injection attack? πŸ”

If your website uses a SQL database you need to be aware of injection attacks, which are simple and incredibly devastating.

πŸ“– Read

via "Security on TechRepublic".
❌ WordPress Urges Users to Uninstall Yuzo Plugin After Flaw Exploited ❌

A vulnerability in the Yuzo Related Posts WordPress plugin, used by 60,000 websites, is being exploited in the wild.

πŸ“– Read

via "Threatpost".
πŸ” Useful Resources for CISOs: Blogs, Papers, Conferences & More πŸ”

We've collected 50 resources, including blogs, videos, research, and databases, to help CISOs keep up with the demands of their busy job.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to block SSH attacks on Linux with denyhosts πŸ”

If you depend on secure shell, learn how you can better protect your servers from SSH attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Patches Are Freezing Older PCs Running Sophos, Avast πŸ•΄

Computers running Sophos or Avast software have been failing to boot following the latest Patch Tuesday update.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ In Security, All Logs Are Not Created Equal πŸ•΄

Prioritizing key log sources goes a long way toward effective incident response.

πŸ“– Read

via "Dark Reading: ".
πŸ” SQL injection attacks: A cheat sheet for business pros πŸ”

SQL injection has been a major security risk since the early days of the internet. Find out what's at risk, and how cybersecurity pros can defend their organizations.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Julian Assange Arrested in London πŸ•΄

The WikiLeaks founder, who was taken from the Ecuadorian Embassy by British police, has been convinced of skipping bail in 2012.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Tax Hacks: How Seasonal Scams Cause Yearlong Problems πŸ•΄

Tax season is marked with malware campaigns, tax fraud, and identity theft, with money and data flowing through an underground economy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Dragonblood' Vulnerabilities Seep Into WPA3 Secure Wifi Handshake πŸ•΄

A new set of vulnerabilities may put some early adopters of strong Wifi security at greater security risk.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New 'HOPLIGHT' Malware Appears in Latest North Korean Attacks, Say DHS, FBI πŸ•΄

The FBI and Department of Homeland Security release malware analysis report, indicators of compromise for nine different executable files.

πŸ“– Read

via "Dark Reading: ".
⚠ Android phones transformed into anti-phishing security tokens ⚠

A new security feature allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts.

πŸ“– Read

via "Naked Security".
⚠ Flickr tackling online image theft with new AI service ⚠

Photo sharing website Flickr is trying to combat copyright infringement with a service that spots copies of its users' images online.

πŸ“– Read

via "Naked Security".
⚠ Feds say Russian 2016 election meddling spanned all US states ⚠

A multi-agency report has strengthened claims that Russia meddled with election systems in all 50 US states during the last presidential race.

πŸ“– Read

via "Naked Security".