πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Facial Recognition β€˜Consent’ Doesn’t Exist, Threatpost Poll Finds ❌

Half of Threatpost readers surveyed in a recent poll don't believe that consent realistically exists when it comes to facial recognition.

πŸ“– Read

via "Threatpost".
πŸ•΄ Go Medieval to Keep OT Safe πŸ•΄

When it comes to operational technology and industrial control systems, make sure you're the lord of all you survey.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Flaws in Sierra Wireless 5G Gateway Allow RCE, Command Injection ❌

A 5G wireless gateway tailored for industrial internet of things (IoT), retail point-of-sale and enterprise redundancy applications is riddled with vulnerabilities, include two critical bugs that allow remote code-execution (RCE) and arbitrary command-injection. The Sierra Wireless AirLink ES450 LTE gateway (version 4.9.3) has 11 different bugs, which could be exploited for RCE, uncovering user credentials […]

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 4/26 Edition πŸ”

A new phishing scam asking for selfies,embedding malware in video games, and the latest IoT vulnerability are all covered in this week's Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2015-9284

The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Widespread scam campaigns targeting millions uncovered by GoDaddy and Palo Alto Networks πŸ”

A research team found that thousands of websites were tricking users into entering credit card information by spoofing trustworthy sites.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to manage user passwords with Group Policy πŸ”

You can enforce various policies to make sure your users meet certain requirements with their Windows passwords. Learn about some of the password-related settings in Group Policy.

πŸ“– Read

via "Security on TechRepublic".
❌ GoDaddy Shutters 14,000 Subdomains Tied to β€˜Snake Oil’ Scams ❌

GoDaddy worked with researchers to shut down 15,000 domain-shadowing websites tied to bogus affiliate marketing offers promoted via spam campaigns.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Amazon Echo Privacy, Facebook FTC Fines and Biometrics Regulation ❌

On this week's Threatpost news wrap, the team discusses Facebook's FTC fine for its data security practices, a report that Amazon is collecting Echo users' geolocation data, and more.

πŸ“– Read

via "Threatpost".
πŸ” US Air Force and Privoro partners for MDM solution πŸ”

New mobile security prototyping contracting between Privoro and the United States Air Force leverages the SafeCase, intelligent smartphone case.

πŸ“– Read

via "Security on TechRepublic".
❌ Users Urged to Disable WordPress Plugin After Unpatched Flaw Disclosed ❌

Yet another WordPress plugin vulnerability has put thousands of websites at risk.

πŸ“– Read

via "Threatpost".
πŸ•΄ Malware Makes Itself at Home in Set-Top Boxes πŸ•΄

Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Slack Warns of Big, Bad Dangers in SEC Filing πŸ•΄

A filing prior to an IPO lists nation-state dangers to Slack's services and customers as a risk for investors.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How to Build a Cloud Security Model πŸ•΄

Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.

πŸ“– Read

via "Dark Reading: ".
πŸ” Small business cybersecurity: The case for MSSPs πŸ”

Small businesses may not have the staff needed to use automated security platforms, which is one reason why opting for a Managed Security Service Provider (MSSP) might be the better option.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity insurance: Read the fine print πŸ”

Before purchasing cybersecurity insurance for your business, be sure you have a thorough understanding of what is covered.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 17 stories of the week ⚠

From DNS over HTTPS to Microsoft's expiration policy - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Piracy streaming apps are stuffed with malware ⚠

Researchers have found that hackers are exploiting vulnerable piracy streaming devices to steal credit card data or rope them into botnets.

πŸ“– Read

via "Naked Security".
⚠ Cops need warrant for both location history and phone pinging, says judge ⚠

It's one of the first location data privacy cases to grapple with the warrant and surveillance implications of the Carpenter decision.

πŸ“– Read

via "Naked Security".
⚠ Cryptocurrency giants in $850m fraud allegations ⚠

The New York Attorney General has accused major cryptocurrency exchange Bitfinex and cryptocurrency Tether of an $850m fraud.

πŸ“– Read

via "Naked Security".
⚠ NIST tool boosts chances of finding dangerous software flaws ⚠

NIST thinks it has reached an important milestone in complex software testing with something called Combinatorial Coverage Measurement (CCM).

πŸ“– Read

via "Naked Security".