πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Teen sues Apple for $1 billion over Apple stores’ facial recognition ⚠

He claims that Apple allegedly uses the technology to spot shoplifters and that it falsely linked him to a series of Apple store thefts.

πŸ“– Read

via "Naked Security".
⚠ Atlanta Hawks fall prey to Magecart credit card skimming group ⚠

The Atlanta Hawks basketball team is recovering after a sophisticated cybercrime group hacked its ecommerce site and planted credit card skimming code on it.

πŸ“– Read

via "Naked Security".
πŸ” Microsoft wants to kill Windows password expiration policy πŸ”

The proposal means that users at organizations with Group Policy would no longer be required to change their Windows passwords on a regular basis.

πŸ“– Read

via "Security on TechRepublic".
⚠ Blochainbandit stole $54 million of Ethereum by guessing weak keys ⚠

Someone has been quietly pilfering Ethereum (ETH) cryptocurrency worth millions of dollars without anyone noticing or, apparently, caring.

πŸ“– Read

via "Naked Security".
πŸ” Businesses hit with 235% more cyberthreats this year πŸ”

Trojans and ransomware top the list of threats with corporate targets in Q1 2019, according to a Malwarebytes report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” The 10 highest-paying cybersecurity jobs πŸ”

Demand for cybersecurity roles jumped over 7% in the last year, leading to increasing salaries, according to Indeed.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 50 InfoSec Networking Groups to Join πŸ”

Looking to stay ahead of the curve on all things infosec? We've gathered a list of 50 valuable associations, LinkedIn networking groups, and meetups for security professionals.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Indeed.com: Slight Dip in Clicks on US Cybersecurity Job Listings πŸ•΄

Meanwhile, most of the highest-paying positions pay more than $100K, according to new analysis from the job posting site.

πŸ“– Read

via "Dark Reading: ".
πŸ” Most SMBs would pay a hacker a ransom to get their stolen data back πŸ”

Social media apps and websites are the biggest potential threat vectors to businesses, according to an AppRiver report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How automated Dark Web marketplaces make credential stuffing attacks more profitable πŸ”

Validated stolen credentials cost less than a cup of coffee, but economies of scale have made selling user accounts more lucrative than ever, according to Recorded Future.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Ramblings of a Recovering Academic on the So-Called Lack of Security Talent πŸ•΄

Hiring for security is difficult, as many surveys show. But what the research doesn't explain is the "why" - and a lack of talent may not be the sole reason.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Regulations, Insider Threat Handicap Healthcare IT Security πŸ•΄

Healthcare IoT is expanding opportunities for hackers as the sector struggles to keep up security-wise.

πŸ“– Read

via "Dark Reading: ".
⚠ ExtraPulsar backdoor based on leaked NSA code – what you need to know ⚠

A US security researcher has come up with an open-source Windows backdoor loosely based on NSA attack code that leaked back in 2017.

πŸ“– Read

via "Naked Security".
❌ Qualcomm Critical Flaw Exposes Private Keys For Android Devices ❌

A side-channel attack in Qualcomm technology, which is used by most modern Android devices, could allow an attacker to snatch private keys.

πŸ“– Read

via "Threatpost".
πŸ” Enterprise cryptojacking attacks continue, despite overall decline in popularity among hackers πŸ”

A newly-discovered cryptojacking campaign uses familiar exploits to target enterprises and traverse network shares, infecting any connected computer.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Sensitive Data Lingers on Used Storage Drives Sold Online πŸ•΄

Four in 10 used hard drives sold on eBay found to contain sensitive information.

πŸ“– Read

via "Dark Reading: ".
πŸ” The 4 most important files for SSH connections πŸ”

You are better armed to make use of the SSH tool with an understanding of four key SSH files.

πŸ“– Read

via "Security on TechRepublic".
❌ Amazon Employees Given β€˜Broad Access’ to Personal Alexa Info ❌

An auditing program for the voice assistant technology exposes geolocation data that can be personally identified, sources said.

πŸ“– Read

via "Threatpost".
πŸ•΄ Enterprise Trojan Detections Spike 200% in Q1 2019 πŸ•΄

Cybercriminals see greater ROI targeting businesses, which have been slammed with ransomware attacks and Trojans.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How a Nigerian ISP Accidentally Hijacked the Internet πŸ•΄

For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-16558

Contao 3.0.0 to 3.5.30 and 4.0.0 to 4.4.7 contains an SQL injection vulnerability in the back end as well as in the listing module.

πŸ“– Read

via "National Vulnerability Database".