πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How 85% of mobile apps violate security standards πŸ”

The majority of mobile apps contain cybersecurity flaws in data storage, communication, or authentication practices, according to a WhiteHat report. Here are three tips to remedy the issues.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Chinese spy chips: 3 potential fallouts for the business world πŸ”

A Bloomberg report found that Chinese spies secretly added microchips on motherboards that went to Apple, Amazon, and the CIA.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ GDPR Report Card: Some Early Gains but More Work Ahead πŸ•΄

US companies paid the most, to date, to meet the EU's General Data Protection Regulation, according to a recent study, but UK companies made greater progress in achieving compliance goals.

πŸ“– Read

via "Dark Reading: ".
πŸ” Windows 10 October update problems: Wiped docs, plus Intel driver warning πŸ”

Back up files before upgrading to Windows 10 1809, and if you get a warning about Intel drivers, do not proceed.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ For $14.71, You Can Buy A Passport Scan on the Dark Web πŸ•΄

That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Apple, Amazon Strongly Refute Server Infiltration Report ❌

An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ” The top 10 cyberthreats IT security teams are facing right now πŸ”

Some 70% of organizations experienced a security breach in the past year, according to a report from Cyren and Osterman Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ” BlackBerry's new blockchain tools could boost security for medical IoT πŸ”

Fresh off the announcement of its Spark platform, BlackBerry unveiled a host of tools aimed at improving data privacy in healthcare.

πŸ“– Read

via "Security on TechRepublic".
❌ Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets ❌

Russian-speaking Turla has also racked up more victims in its latest APT campaign.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ ThreatList: 83% of Routers Contain Vulnerable Code ❌

Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards πŸ•΄

If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Steps to Start Your Risk Assessment πŸ•΄

Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations πŸ•΄

Netherlands expels four of the suspects trying to break into an organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9271

The VideoWhisper videowhisper-video-conference-integration plugin 4.91.8 for WordPress allows remote attackers to execute arbitrary code because vc/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code, a different vulnerability than CVE-2014-1905.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-9272

The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10076

The wp-db-backup plugin 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-10075

The karo gem 2.3.8 for Ruby allows Remote command injection via the host field.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7465

Ice Cold Apps Servers Ultimate 6.0.2(12) does not require authentication for TELNET, SSH, or FTP, which allows remote attackers to execute arbitrary code by uploading PHP scripts.

πŸ“– Read

via "National Vulnerability Database".
⚠ Google’s Intra app secures older Androids with encrypted DNS ⚠

DNS encryption is the Next Big Thing in web encryption and Google doesn't want Android users to miss out.

πŸ“– Read

via "Naked Security".
⚠ Facebook doubles cooling off period to cash in on your FOMO ⚠

Facebook has doubled its grace period because so many leavers are getting cold feet.

πŸ“– Read

via "Naked Security".
⚠ Wi-Fi versions to get names people can actually understand ⚠

The high priests of Wi-Fi just made your life - and the lives of wireless network equipment vendors everywhere - a little easier.

πŸ“– Read

via "Naked Security".