πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Ransomware attackers, US mayors say you should go jump in a lake ⚠

The US Conference of Mayors has unanimously adopted a resolution not to pay any more ransoms to hackers.

πŸ“– Read

via "Naked Security".
⚠ FCC underwhelmed by carriers’ sluggish robocall efforts ⚠

The FCC in June called for carriers to provide free, default robocall blocking services. One month later, plans are "far from clear."

πŸ“– Read

via "Naked Security".
πŸ” How will Wi-Fi 5 & WPA2 coexist with Wi-Fi 6 and WPA3? πŸ”

The migration to Wi-Fi 6 is the most complex in roughly a decade, as a new authentication standard is necessary to ensure security integrity. How will the two standards coexist?

πŸ“– Read

via "Security on TechRepublic".
⚠ Apple quietly removes Zoom’s hidden web server from Macs ⚠

In the latest twist in the saga of the web-conferencing app, Apple has issued a β€˜silent’ update removing Zoom's hidden web server from Macs.

πŸ“– Read

via "Naked Security".
❌ Why Cities Are a Low-Hanging Fruit For Ransomware ❌

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.

πŸ“– Read

via "Threatpost".
⚠ Bust the password for an air-gapped machine – with its keyboard LEDs ⚠

Researchers have developed a technique for reading data from air-gapped PCs using LEDs. Cue dynamic hacker music now!

πŸ“– Read

via "Naked Security".
πŸ” Top 5 cybersecurity challenges for CISOs πŸ”

CISOs must drive business strategy amid an expanded attack surface and increasing security complexity, according to Fortinet.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Is Machine Learning the Future of Cloud-Native Security? πŸ•΄

The nature of containers and microservices makes them harder to protect. Machine learning might be the answer going forward.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-10374

On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Infographic: Why email is your weakest security link πŸ”

Employees receive nearly five phishing emails per work week, according to Avanan.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Where Businesses Waste Endpoint Security Budgets πŸ•΄

Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.

πŸ“– Read

via "Dark Reading: ".
❌ Researcher Bypasses Instagram 2FA to Hack Any Account ❌

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.

πŸ“– Read

via "Threatpost".
⚠ Instagram bug could have allowed anyone to take over your account ⚠

The good news is that Facebook updated Instagram's server-side defences automatically, so you don't have to do anything to fix this one.

πŸ“– Read

via "Naked Security".
πŸ•΄ 18% of Enterprises Holding Back on Windows 10 Upgrade πŸ•΄

Microsoft will officially end support for Windows 7 on January 14, 2020. Many large businesses aren't ready.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to solve the dreaded Wordpress site maintenance error πŸ”

If your Wordpress site is stuck in maintenance mode, there's a simple fix.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Latest Trade Secret Theft Case Involves Train Manufacturer πŸ”

It's believed the suspect, a software engineer, took the trade secrets with him to China, where he now resides.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Software Developers Face Secure Coding Challenges πŸ•΄

Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FTC Reportedly Ready to Sock Facebook with Record $5 Billion Fine πŸ•΄

The fine, for the social media giant's role in the Cambridge Analytica scandal, would be the largest ever against a tech company.

πŸ“– Read

via "Dark Reading: ".
❌ Turla APT Returns with New Malware, Anti-Censorship Angle ❌

A dropper called β€œTopinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.

πŸ“– Read

via "Threatpost".