πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ DeepDotWeb Operators Indicted, Website Seized by the FBI πŸ•΄

Defendants allegedly earned kickbacks for sales of illegal contraband, including hacking tools and malicious code.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2018 Arrests Have Done Little to Stop Marauding Threat Group πŸ•΄

In fact, FIN7's activities only appear to have broadened, according to a new report.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to work with Protected View in Microsoft Office πŸ”

Microsoft's Protected View feature tries to protect you against potentially malicious files and documents. Here's how to use it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use the Tor browser on an Android device πŸ”

Tor can safeguard your browsing activities on an Android device via a new app in alpha release. Here's how to use and tweak it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to create an SSH jailed user on Debian 9 πŸ”

Learn how to limit what SSH users can do by jailing them with the help of Jailkit.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Only 9% of companies warn employees about IoT risks πŸ”

Data breaches caused by unsecured Internet of Things devices increased to 26% this year, according to a Ponemon Institute report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” 5 quick SSH hardening tips πŸ”

If you make use of Secure Shell, you'll want to run down this checklist of five quick tips to make that Linux server a bit more secure.

πŸ“– Read

via "Security on TechRepublic".
⚠ Chrome plans to save you from sites that mess with your back button ⚠

Has your back button ever mysteriously stopped working?

πŸ“– Read

via "Naked Security".
⚠ DeepDotWeb seized, suspected admins arrested ⚠

The suspected admins of the DeepDotWeb site are alleged to have sent buyers to illegal markets in exchange for millions in kickbacks.

πŸ“– Read

via "Naked Security".
πŸ” Security Alphabet Soup πŸ”

There is no shortage of unique terms and acronyms within the cybersecurity industry. In many ways, security has a language of its own. This guide lists more than 40 of the most common cybersecurity acronyms, serving as a resource for beginners and a reference guide for those with more experience. Terms are listed in alphabetical order for ease-of-use.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
⚠ CSS tracking trick can monitor your mouse without JavaScript ⚠

A security researcher has demonstrated a new way to track mouse movements even if users block JavaScript.

πŸ“– Read

via "Naked Security".
πŸ•΄ Fighting Back Against Tech-Savvy Fraudsters πŸ•΄

Staying a step ahead requires moving beyond the security techniques of the past.

πŸ“– Read

via "Dark Reading: ".
⚠ Metal keys beat smart locks in NYC legal battle ⚠

A group of tenants in New York City have prevailed in a lawsuit against their landlord's use of smart locks.

πŸ“– Read

via "Naked Security".
❌ Researchers in the Dark on Powerful LightNeuron Malware for Years ❌

LightNeuron is the first to target Microsoft Exchange transport agents -- and is used as a hub for major Turla APT espionage efforts.

πŸ“– Read

via "Threatpost".
πŸ•΄ Sectigo Buys Icon Labs to Expand IoT Security Platform πŸ•΄

End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.

πŸ“– Read

via "Dark Reading: ".
πŸ” Companies moving to the cloud still ignore security concerns πŸ”

Nine in 10 cloud breaches occur due to employee mistakes, according to a Kaspersky Lab report.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2017-12788

Multiple cross-site scripting (XSS) vulnerabilities in admin/index.php in Metinfo 5.3.18 allows remote attackers to inject arbitrary web script or HTML via the (1) class1 parameter or the (2) anyid parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ Sextortion mail from yourself? It doesn’t mean you’ve been hacked… ⚠

Here's a 30-second video you can show your friends and family if they freak out after receiving a scam email apparently from themselves...

πŸ“– Read

via "Naked Security".
πŸ” On-device speech recognition may make smart assistants more appealing πŸ”

Google unveiled the next-generation Google Assistant at I/O 2019, featuring an on-device speech recognition model-bypassing the need to upload voice samples to cloud systems.

πŸ“– Read

via "Security on TechRepublic".
❌ Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked ❌

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

πŸ“– Read

via "Threatpost".