πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security ❌

Supply-chain attacks are on the rise, but machine learning provides the edge that the security industry needs to keep up.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Cloud, Containers, Orchestration Big Factors in BSIMM9 ❌

A converged architecture that brings independent software vendors, cloud vendors and IoT vendors together is reshaping the security landscape.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ An Intro to Intra, the Android App for DNS Encryption πŸ•΄

Alphabet's Jigsaw has released Intra, a free security app that aims to prevent government censorship.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Palo Alto Buys RedLock to Strengthen Cloud Security πŸ•΄

The transaction, valued at $173 million, is intended to bring analytics and threat detection to Palo Alto Networks' cloud security offering.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why we need more cybersecurity workers right now πŸ”

At the 2018 Grace Hopper Celebration, Katie Jenkins of Liberty Mutual, explained how to attract more diverse candidates to cybersecurity roles.

πŸ“– Read

via "Security on TechRepublic".
❌ Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps ❌

This code-signing issue represents a new attack vector, according to the researcher.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Inside the North Korean Hacking Operation Behind SWIFT Bank Attacks πŸ•΄

FireEye details how this money-stealing operation it now calls APT 38 has emerged in the past four years and how it operates.

πŸ“– Read

via "Dark Reading: ".
❔ How can my Facebook account be misused if hacked? ❔

Estimated reading time: 2 minutesAt a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users on the afternoon of 28th September, when they found their accounts to be hacked. While life seemed to have come to a standstill for most Facebook addicts, the rest were worried about the consequences of their accounts being hacked. Regardless of whether you are a Facebook addict or an infrequent visitor, hacking of your account can have disastrous after-effects. Profile Change – To begin with, once the hacker has gained access to your account, he or she can change your profile to anything their heart desires. This can mean changing your normal account to someone with terrorist links or something even beyond your imagination. Post/Upload Things – This can especially be a shocking revelation for users who love to flaunt their personal pics on social media sites like Facebook. Your account once hacked, can make it a cakewalk for hackers to upload, post or share images and other such stuff that in-turn can ruin your reputation forever. In the recent past, there have been several cases where a user’s account has been hacked and their private pictures have been circulated through the internet. Forced Shares – This can be really scary not just for you but mostly for your account contacts. The hacker may just share a link on your behalf to some website which has an enticing title to it, while tagging many of your friends. As a matter of fact, your friends may be tempted to open the link, totally unaware of the fact that your account has been hacked. The website link may instead open to a page full of Trojans and malware that can pose risk for their own accounts. Forced Follows – Your hacked social media account can be used by the hacker to force people into following a particular account. This account may have a fake brand name and the hacker may just be trying to use it to tempt people into following a page that can spread malware. Information Theft – This is probably the worst thing that can happen to you, in case your account gets hacked. Hacking into your account can provide the hacker easy access to your username and password. The hacker can use this same information to sign into your other accounts like your bank account or other social media accounts, to mine more details about you. Simple things you can do to protect your Facebook account Use complex passwords – As a rule, choose a unique password for your Facebook account, something that you don’t use for accessing other accounts. Make your passwords strong and complex by mixing upper and lower cases, numbers and special characters. Stay away from phishing emails – At times you may receive fraudulent emails from an authentic-sounding company, providing you a link for uploading your personal details. A good way to check its authenticity, is to search for the specific website URL online instead of clicking the link provided to you on email. Check source of download – The internet is filled with dozens of websites known as β€œwarez websites” meant especially to carry Trojan horses. Thus, whenever you are downloading something onto your computer, be sure to check the source of download. The post How can my Facebook account be misused if hacked? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

πŸ“– Read

via "Quick Heal Blog | Latest computer security news, tips, and advice".
⚠ Facebook finds β€œno evidence” that attackers accessed third-party apps ⚠

To play it safe, it's building a tool to let developers manually identify any of their users who may have been affected by the big breach.

πŸ“– Read

via "Naked Security".
⚠ Cop charged with selling phone tracking service on dark web ⚠

A French police officer has been charged with using police intelligence data to power a mobile phone tracking service sold via the dark web.

πŸ“– Read

via "Naked Security".
⚠ Setting up a Mac for young children ⚠

A step-by-step guide to preparing a Mac for young children.

πŸ“– Read

via "Naked Security".
πŸ•΄ Don't Miss the Action-Packed Arsenal Offerings at Black Hat Europe πŸ•΄

Organizers are hard at work preparing for another remarkable Black Hat Europe event in London this December. Here's a sneak peek at two fantastic demos you'll see there.

πŸ“– Read

via "Dark Reading: ".
πŸ” How 85% of mobile apps violate security standards πŸ”

The majority of mobile apps contain cybersecurity flaws in data storage, communication, or authentication practices, according to a WhiteHat report. Here are three tips to remedy the issues.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Chinese spy chips: 3 potential fallouts for the business world πŸ”

A Bloomberg report found that Chinese spies secretly added microchips on motherboards that went to Apple, Amazon, and the CIA.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ GDPR Report Card: Some Early Gains but More Work Ahead πŸ•΄

US companies paid the most, to date, to meet the EU's General Data Protection Regulation, according to a recent study, but UK companies made greater progress in achieving compliance goals.

πŸ“– Read

via "Dark Reading: ".
πŸ” Windows 10 October update problems: Wiped docs, plus Intel driver warning πŸ”

Back up files before upgrading to Windows 10 1809, and if you get a warning about Intel drivers, do not proceed.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ For $14.71, You Can Buy A Passport Scan on the Dark Web πŸ•΄

That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Apple, Amazon Strongly Refute Server Infiltration Report ❌

An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” The top 10 cyberthreats IT security teams are facing right now πŸ”

Some 70% of organizations experienced a security breach in the past year, according to a report from Cyren and Osterman Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ” BlackBerry's new blockchain tools could boost security for medical IoT πŸ”

Fresh off the announcement of its Spark platform, BlackBerry unveiled a host of tools aimed at improving data privacy in healthcare.

πŸ“– Read

via "Security on TechRepublic".