πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Why nearly 50% of organizations are failing at password security πŸ”

Employees are sharing an average of six passwords with their coworkers, according to the LastPass 2018 Global Password Security Report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Right Diagnosis: A Cybersecurity Perspective πŸ•΄

A healthy body and a healthy security organization have a lot more in common than most people think.

πŸ“– Read

via "Dark Reading: ".
⚠ How to have that difficult β€œstay safe online” conversation with your kids ⚠

As your children start using the internet with greater independence, help keep them - and their data - safe with these simple tips.

πŸ“– Read

via "Naked Security".
πŸ” Despite digital growth, 25% of SMBs still track finances on paper πŸ”

Companies are putting their finances and security at risk by not using digital-based tracking, according to a Clutch report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Employees Share Average of 6 Passwords With Co-Workers πŸ•΄

Password-sharing and reuse is still prominent, but mulit-factor authentication is on the rise, new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ California Enacts First-in-Nation IoT Security Law πŸ•΄

The new law requires some form of authentication for most connected devices.

πŸ“– Read

via "Dark Reading: ".
❌ California, U.S. Government Battle Over Net Neutrality State Law ❌

The Department of Justice has filed a lawsuit after SB 822 was passed, enforcing net neutrality laws, on Sunday.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” Top 5 things to know about voting and the blockchain πŸ”

From security to anonymity, here are the top 5 things you should know about blockchain and voting.

πŸ“– Read

via "Security on TechRepublic".
❌ Nine NAS Bugs Open LenovoEMC, Iomega Devices to Attack ❌

Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ October Events at Dark Reading You Can't Miss πŸ•΄

Cybersecurity Month at Dark Reading is packed with educational webinars, from data breach response to small business security.

πŸ“– Read

via "Dark Reading: ".
❌ Adobe Patches 47 Critical Flaws in Acrobat and DC ❌

The update includes a security bypass bug that enables privilege escalation.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains πŸ•΄

Using a cooling-off period for domain names can help catch those registered by known bad actors.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains πŸ•΄

Using a cooling-off period for domain names can help catch those registered by known bad actors.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9270

XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9269

The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Why Australia is quickly developing a technology-based human rights problem πŸ”

Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.

πŸ“– Read

via "Security on TechRepublic".
⚠ Students swap data for coffee at cashless cafe ⚠

In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.

πŸ“– Read

via "Naked Security".
⚠ Suspect forced to unlock iPhone with his face ⚠

The order so far hasn't raised Fifth Amendment objections either, your face being something you are, rather than something you know.

πŸ“– Read

via "Naked Security".
⚠ Lock screen bypass already discovered for Apple’s iOS 12 ⚠

Apple’s iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a device’s contents.

πŸ“– Read

via "Naked Security".
⚠ Hackers demand ransom from hijacked Instagram influencers ⚠

Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, revealed reports this week.

πŸ“– Read

via "Naked Security".
❌ ThreatList: Password Hygiene Remains Lackluster in Global Businesses ❌

Password-sharing persists, but at least multifactor authentication usage is up.

πŸ“– Read

via "The first stop for security news | Threatpost ".