πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Windows 7 users upset by unwanted Patch Tuesday telemetry ⚠

This is either a minor controversy blown out of proportion, or the latest example of Microsoft’s disregard for its users’ wishes.

πŸ“– Read

via "Naked Security".
⚠ Hey, Google, why are your contractors listening to me? ⚠

Humans are listening to our recordings - some made by mistake - to improve speech recognition. But they're not as anonymous as Google says.

πŸ“– Read

via "Naked Security".
⚠ IT pros: we’re understaffed, under-resourced and under pressure ⚠

Increasingly complex attacks coupled with a shortage in skills and budget are worrying IT managers across the globe.

πŸ“– Read

via "Naked Security".
πŸ•΄ Black Hat USA Arsenal Serves Up A Smorgasbord of Cybersecurity Tools πŸ•΄

Visit the Arsenal this August to go hands-on with hackable gadgets and catch live demos of open-source security tools from some of the best in the business.

πŸ“– Read

via "Dark Reading: ".
❌ Hacked Hair Straighteners Can Threaten Homes ❌

A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation.

πŸ“– Read

via "Threatpost".
πŸ” How to tell if any of your website passwords may have been hacked πŸ”

If you're worried a password you use to log in to a site was leaked during a data breach, read about two websites and a Chrome extension that can alert you if this happens.

πŸ“– Read

via "Security on TechRepublic".
❌ Unusual Linux Ransomware Targets NAS Servers ❌

QNAPCrypt continues to spread via brute-force attacks.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 7/12 Edition πŸ”

Android malware, peeling back the layers on the GandCrab malware, and a recruiting website leak - catch up on the week's news with this week's Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ A Lawyer's Guide to Cyber Insurance: 4 Basic Tips πŸ•΄

The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Competing Priorities Mean Security Risks for Small Businesses πŸ•΄

Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ German Schools Ban Office 365, Cite Privacy Concerns πŸ•΄

The ruling follows years of debate over whether German schools and institutions should use Microsoft tools and services.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to create an access key for the root user in AWS πŸ”

Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk.

πŸ“– Read

via "Security on TechRepublic".
❌ Heather Mills Gets An Apology and β€˜Substantial’ Settlement in Spyware Case ❌

Rupert Murdoch's News Group has agreed to pay damages to Paul McCartney's ex as part of the massive phone-hacking scandal by UK tabloids.

πŸ“– Read

via "Threatpost".
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
⚠ In memoriam – Corby CorbatΓ³, MIT computer science pioneer, dies at 93 ⚠

Fernando JosΓ© CorbatΓ³, Turing Award winner, computer scientist extraordinaire, MIT computer lab pioneer, RIP.

πŸ“– Read

via "Naked Security".
❌ Exploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub ❌

Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types.

πŸ“– Read

via "Threatpost".
❌ Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks ❌

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 22 stories of the week ⚠

From a Ruby gem backdoor to the things that keep IT managers awake - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Ransomware attackers, US mayors say you should go jump in a lake ⚠

The US Conference of Mayors has unanimously adopted a resolution not to pay any more ransoms to hackers.

πŸ“– Read

via "Naked Security".
⚠ FCC underwhelmed by carriers’ sluggish robocall efforts ⚠

The FCC in June called for carriers to provide free, default robocall blocking services. One month later, plans are "far from clear."

πŸ“– Read

via "Naked Security".
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".