πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Friday Five: 7/12 Edition πŸ”

Android malware, peeling back the layers on the GandCrab malware, and a recruiting website leak - catch up on the week's news with this week's Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ A Lawyer's Guide to Cyber Insurance: 4 Basic Tips πŸ•΄

The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Competing Priorities Mean Security Risks for Small Businesses πŸ•΄

Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ German Schools Ban Office 365, Cite Privacy Concerns πŸ•΄

The ruling follows years of debate over whether German schools and institutions should use Microsoft tools and services.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to create an access key for the root user in AWS πŸ”

Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk.

πŸ“– Read

via "Security on TechRepublic".
❌ Heather Mills Gets An Apology and β€˜Substantial’ Settlement in Spyware Case ❌

Rupert Murdoch's News Group has agreed to pay damages to Paul McCartney's ex as part of the massive phone-hacking scandal by UK tabloids.

πŸ“– Read

via "Threatpost".
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
⚠ In memoriam – Corby CorbatΓ³, MIT computer science pioneer, dies at 93 ⚠

Fernando JosΓ© CorbatΓ³, Turing Award winner, computer scientist extraordinaire, MIT computer lab pioneer, RIP.

πŸ“– Read

via "Naked Security".
❌ Exploring the Top 15 Most Common Vulnerabilities with HackerOne and GitHub ❌

Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types.

πŸ“– Read

via "Threatpost".
❌ Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks ❌

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place.

πŸ“– Read

via "Threatpost".
⚠ Monday review – the hot 22 stories of the week ⚠

From a Ruby gem backdoor to the things that keep IT managers awake - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Ransomware attackers, US mayors say you should go jump in a lake ⚠

The US Conference of Mayors has unanimously adopted a resolution not to pay any more ransoms to hackers.

πŸ“– Read

via "Naked Security".
⚠ FCC underwhelmed by carriers’ sluggish robocall efforts ⚠

The FCC in June called for carriers to provide free, default robocall blocking services. One month later, plans are "far from clear."

πŸ“– Read

via "Naked Security".
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple quietly removes Zoom’s hidden web server from Macs ⚠

In the latest twist in the saga of the web-conferencing app, Apple has issued a β€˜silent’ update removing Zoom's hidden web server from Macs.

πŸ“– Read

via "Naked Security".
❌ Why Cities Are a Low-Hanging Fruit For Ransomware ❌

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.

πŸ“– Read

via "Threatpost".
⚠ Bust the password for an air-gapped machine – with its keyboard LEDs ⚠

Researchers have developed a technique for reading data from air-gapped PCs using LEDs. Cue dynamic hacker music now!

πŸ“– Read

via "Naked Security".
πŸ” Top 5 cybersecurity challenges for CISOs πŸ”

CISOs must drive business strategy amid an expanded attack surface and increasing security complexity, according to Fortinet.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Is Machine Learning the Future of Cloud-Native Security? πŸ•΄

The nature of containers and microservices makes them harder to protect. Machine learning might be the answer going forward.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10374

On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Infographic: Why email is your weakest security link πŸ”

Employees receive nearly five phishing emails per work week, according to Avanan.

πŸ“– Read

via "Security on TechRepublic".