πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Equifax to Pay Up to $700mn for Data Breach Damages πŸ•΄

In a settlement with the FTC, consumers affected by the breach are eligible for up to $20,000 in a cash settlement, depending on damages they can prove.

πŸ“– Read

via "Dark Reading: ".
⚠ FSB hackers drop files online ⚠

A hacking group that distributed files stolen from a Russian contractor to the media last week has published some of the documents online.

πŸ“– Read

via "Naked Security".
⚠ Your Android’s accelerometer could be used to eavesdrop on your calls ⚠

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.

πŸ“– Read

via "Naked Security".
⚠ Big password hole in iOS 13 beta spotted by testers ⚠

A security clanger has been spotted in the current beta version of iOS 13 which allows anyone to access a user’s stored web and app passwords without having to authenticate.

πŸ“– Read

via "Naked Security".
πŸ” How organizations and employees can protect themselves against financial email scams πŸ”

Fraudulent emails that try to trick their victims into conducting financial transactions amounted to losses of more than $1.2 billion in 2018, according to a new study from Symantec.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How businesses can reduce the financial impact of data breaches πŸ”

The cost of a data breach has grown 12% over the past 5 years, hitting $3.92 million on average. Organizations can take steps to mitigate the financial damage, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Security Considerations in a BYOD Culture πŸ•΄

The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Planning a Bug Bounty Program? Follow Shopify's Example πŸ•΄

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ DHS's Bob Kolasky Goes All in on Risk Management πŸ•΄

As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

πŸ“– Read

via "Dark Reading: ".
⚠ Programmer from hell plants logic bombs to guarantee future work ⚠

At some dark moment, have you ever wondered: what if the programmers are adding the bugs deliberately?

πŸ“– Read

via "Naked Security".
πŸ” Top 5 things to know about service mesh πŸ”

Service mesh helps balance your app infrastructure while still maintaining proper encryption and authentication. Tom Merritt discusses five things you need to know about service mesh.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 things to know about service mesh πŸ”

Service mesh helps balance your app infrastructure while still maintaining proper encryption and authentication. Tom Merritt discusses five things you need to know about service mesh.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The War for Cyber Talent Will Be Won by Retention not Recruitment πŸ•΄

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 7/19 Edition πŸ”

Microsoft's new phishing detection feature, an increase in cybersecurity spend, and more - catch up on the week's news with this round up.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How risk management can help secure industrial IoT and big data πŸ”

Read about approaches your company can take to manage IoT and big data cyber risks.

πŸ“– Read

via "Security on TechRepublic".
❌ VLC Media Player Plagued By Unpatched Critical RCE Flaw ❌

A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-18669

GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.

πŸ“– Read

via "National Vulnerability Database".
❌ Popular Samsung, LG Android Phones Open to β€˜Spearphone’ Eavesdropping ❌

A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.

πŸ“– Read

via "Threatpost".
⚠ SharePoint Online scam – sadly, phishing’s not dead ⚠

Not all phishes contain easily spotted errors or obviously dodgy web links - here's how to stay safe...

πŸ“– Read

via "Naked Security".
πŸ•΄ CISA Warns Public About the Risks of 5G πŸ•΄

Vulnerabilities include everything from physical risks through the supply chain to business risks.

πŸ“– Read

via "Dark Reading: ".