🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Come to Black Hat USA for the Latest Hardware Hacks 🕴

Cars. Vending machines. Hotel suites. Security experts will share the tools and techniques they've used to break into all these things and more at Black Hat USA in October.

📖 Read

via "Dark Reading: ".
🔐 How to prepare for and navigate a technology disaster 🔐

Technology emergencies can be the most stressful moments of an IT professional's career. But they don't have to if you plan ahead.

📖 Read

via "Security on TechRepublic".
EatStreet Hackers Chow Down on Diner Data

Gnosticplayers have reportedly taken credit for the breach, which they say consists of 6 million records.

📖 Read

via "Threatpost".
🕴 How Hackers Emptied Church Coffers with a Simple Phishing Scam 🕴

Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.

📖 Read

via "Dark Reading: ".
🔐 How to prevent Android from displaying passwords 🔐

Don't let bystanders see your Android passwords as you type them. Find out how to disable this feature.

📖 Read

via "Security on TechRepublic".
🔐 76% of mobile apps have flaws allowing hackers to steal passwords, money, and texts 🔐

Android apps have more critical vulnerabilities than iOS apps do, according to a Positive Technologies report.

📖 Read

via "Security on TechRepublic".
🔐 How to prevent Android from displaying passwords 🔐

Don't let bystanders see your Android passwords as you type them. Find out how to disable this feature.

📖 Read

via "Security on TechRepublic".
🔐 Tech news roundup: HPE Discover 2019, Facebook's Libra cryptocurrency, and Google Cloud's debacle 🔐

This week's TechRepublic and ZDNet news stories include a look at the companies that hire the most data scientists, four significant impacts of a security breach, and a first-hand account of a major hack job.

📖 Read

via "Security on TechRepublic".
🔐 How AI-enhanced malware poses a threat to your organization 🔐

Malware controlled by artificial intelligence could create more convincing spam, avoid security detection, and better adapt itself to each target, says a new report from Malwarebytes.

📖 Read

via "Security on TechRepublic".
🔐 Tech news roundup: HPE Discover 2019, Facebook's Libra cryptocurrency, and Google Cloud's debacle 🔐

This week's TechRepublic and ZDNet news stories include a look at the companies that hire the most data scientists, four significant impacts of a security breach, and a first-hand account of a major hack job.

📖 Read

via "Security on TechRepublic".
🕴 6 Security Tips That'll Keep the Summer Fun 🕴

Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready.

📖 Read

via "Dark Reading: ".
🔐 How to solve the dreaded Wordpress site maintenance error 🔐

If your Wordpress site is stuck in maintenance mode, there's a simple fix.

📖 Read

via "Security on TechRepublic".
🔐 How to install an FTP server and secure it with TLS 🔐

Gain more security with your open source FTP server with the help of OpenSSL and TLS.

📖 Read

via "Security on TechRepublic".
🕴 Cost per Cyberattack Jumps to $4.6M in 2019 🕴

From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.

📖 Read

via "Dark Reading: ".
Oracle Warns of New Actively-Exploited WebLogic Flaw

Oracle is urging users to update after a critical WebLogic Server Flaw was found being actively exploited in the wild.

📖 Read

via "Threatpost".
ATENTION New - CVE-2017-1107

IBM Marketing Platform 9.1.0, 9.1.2, 10.0, and 10.1 exposes sensitive information in the headers that could be used by an authenticated attacker in further attacks against the system. IBM X-Force ID: 120906.

📖 Read

via "National Vulnerability Database".
🕴 Serverless Computing from the Inside Out 🕴

The biggest 'serverless' risks don't stem from the technonology itself. They occur when organizations respond to the adoption from the outside in.

📖 Read

via "Dark Reading: ".
🕴 Verizon Media, Uber, PayPal Top List of Companies Paying Bug Bounties 🕴

A new report from HackerOne lists the top five companies running bug-hunting programs on the ethical hacking platform.

📖 Read

via "Dark Reading: ".
🔏 Medical Debt Collector Poised to Shutter Following 2018 Breach 🔏

A data breach and mounting cybersecurity consulting costs, legal requirements, and regulatory obligations, proved too much for this company to come back from.

📖 Read

via "Subscriber Blog RSS Feed ".
Google Releases Open Source Tool For Computational Privacy

Google's new multi-party computation tool allows companies to work together with confidential data sets.

📖 Read

via "Threatpost".
🕴 Critical Firefox Vuln Used in Targeted Attacks 🕴

Mozilla has released patches for the bug reported by Coinbase.

📖 Read

via "Dark Reading: ".