πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Americans overestimate their online safety, despite putting forward little effort πŸ”

A survey of 10,000 Americans found that 90% believe they are doing enough to protect themselves online, though less than half are even doing the bare minimum.

πŸ“– Read

via "Security on TechRepublic".
❌ Lax Telco Security Allows Mobile Phone Hijacking and Redirects ❌

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls.

πŸ“– Read

via "Threatpost".
❌ Google Patches Critical Remote Code-Execution Flaws in Android ❌

The Android security update patches 15 bugs, four rated critical, 10 rated high and one ranked moderate in severity.

πŸ“– Read

via "Threatpost".
πŸ” Fix on the way for Google Chrome flaw allowing malicious websites to break back button πŸ”

Google Chrome users have complained for years about how browser handles history, allowing malicious websites to inhibit back button usage.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ FBI: Cybercrime Losses Doubled in 2018 πŸ•΄

The world has embraced digital technology, but cybercrime is putting a serious dent in corporate finances, the FBI finds.

πŸ“– Read

via "Dark Reading: ".
πŸ” Today's most innovative enterprise solutions πŸ”

Max Wessel spoke with TechRepublic at the 2019 SAP SAPPHIRE NOW conference about the most beneficial enterprise solutions organizations should be using.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cyberespionage, Social Engineering, Misconfiguration Errors Culprits in Verizon's 2019 Data Breach Report πŸ”

The latest edition of the report analyzed over 40,000 security incidents to identify trends and changes by threat actors.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to create an SSH jailed user on Debian 9 πŸ”

Learn how to limit what SSH users can do by jailing them with the help of Jailkit.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to securely delete files in Linux with SRM πŸ”

Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for more secure removal.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Social Engineering Slams the C-Suite: Verizon DBIR πŸ•΄

Criminals are also going after cloud-based email accounts, according to Verizon's '2019 Data Breach Investigations Report.'

πŸ“– Read

via "Dark Reading: ".
❌ Airbnb Superhost Secretly Recorded Guests with Hidden Bedroom Camera ❌

The incident is only the latest in a string of disturbing horror stories of guests finding live, recording cameras hidden in their Airbnb flats.

πŸ“– Read

via "Threatpost".
πŸ•΄ DeepDotWeb Operators Indicted, Website Seized by the FBI πŸ•΄

Defendants allegedly earned kickbacks for sales of illegal contraband, including hacking tools and malicious code.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2018 Arrests Have Done Little to Stop Marauding Threat Group πŸ•΄

In fact, FIN7's activities only appear to have broadened, according to a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to work with Protected View in Microsoft Office πŸ”

Microsoft's Protected View feature tries to protect you against potentially malicious files and documents. Here's how to use it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Tor browser on an Android device πŸ”

Tor can safeguard your browsing activities on an Android device via a new app in alpha release. Here's how to use and tweak it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to create an SSH jailed user on Debian 9 πŸ”

Learn how to limit what SSH users can do by jailing them with the help of Jailkit.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Only 9% of companies warn employees about IoT risks πŸ”

Data breaches caused by unsecured Internet of Things devices increased to 26% this year, according to a Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5 quick SSH hardening tips πŸ”

If you make use of Secure Shell, you'll want to run down this checklist of five quick tips to make that Linux server a bit more secure.

πŸ“– Read

via "Security on TechRepublic".
⚠ Chrome plans to save you from sites that mess with your back button ⚠

Has your back button ever mysteriously stopped working?

πŸ“– Read

via "Naked Security".
⚠ DeepDotWeb seized, suspected admins arrested ⚠

The suspected admins of the DeepDotWeb site are alleged to have sent buyers to illegal markets in exchange for millions in kickbacks.

πŸ“– Read

via "Naked Security".
πŸ” Security Alphabet Soup πŸ”

There is no shortage of unique terms and acronyms within the cybersecurity industry. In many ways, security has a language of its own. This guide lists more than 40 of the most common cybersecurity acronyms, serving as a resource for beginners and a reference guide for those with more experience. Terms are listed in alphabetical order for ease-of-use.

πŸ“– Read

via "Subscriber Blog RSS Feed ".