πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook admits to Messenger Kids security hole ⚠

A hole in the supposed closed-loop messaging system allowed children to join group chats with people their parents hadn’t approved.

πŸ“– Read

via "Naked Security".
⚠ Apple’s July patchfest fixes bugs in multiple products ⚠

Apple released fixes for various products this week, including one for a bug that has been public with proof-of-concept code for two months.

πŸ“– Read

via "Naked Security".
πŸ•΄ VPNs' Future: Less Reliant on Users, More Transparent, And Smarter πŸ•΄

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Travel Security [from J4vv4D] πŸ•΄

Do you travel to dangerous places, like Information Security Conferences?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat USA Offers Inside Look at Boeing 787 Security Flaws πŸ•΄

The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.

πŸ“– Read

via "Dark Reading: ".
πŸ” 83% have experienced a DDoS attack in the past two years, survey finds πŸ”

The ease with which DDoS attacks can be waged makes them particularly prevalent, with over half surveyed experiencing multiple attacks waged against their organization.

πŸ“– Read

via "Security on TechRepublic".
❌ Protecting Against Ransomware Attacks: A Checklist ❌

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.

πŸ“– Read

via "Threatpost".
πŸ•΄ The Commoditization of Multistage Malware Attacks πŸ•΄

Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Stats That Show What it Takes to Run a Modern SOC πŸ•΄

An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

πŸ“– Read

via "Dark Reading: ".
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to prevent unsigned Docker images from being pulled πŸ”

Make sure you're only pulling down signed Docker images with Content Trust enabled.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DEF CON Invites Kids to Crack Campaign Finance Portals πŸ•΄

DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.

πŸ“– Read

via "Dark Reading: ".
❌ Unique Monokle Android Spyware Self-Signs Certificates ❌

Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.

πŸ“– Read

via "Threatpost".
πŸ” Highlighting Data Protection Best Practices for IIoT Systems πŸ”

A new paper, released Monday, is designed to act as a best practices guide to IIoT (industrial IoT) systems that connect control systems with enterprise systems and business processes.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack πŸ•΄

IoT botnet-made up mainly of routers-hit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.

πŸ“– Read

via "Dark Reading: ".
πŸ” Tech news roundup: Managing IoT, new iPhones, and phishing concerns πŸ”

This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Tech news roundup: Managing IoT, new iPhones, and phishing concerns πŸ”

This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ NSA to Form New Cybersecurity Directorate πŸ•΄

Anne Neuberger will lead the directorate, which aims to bring together the NSA's offensive and defensive operations.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Human Error is Behind One Quarter of Data Breaches ❌

Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute.

πŸ“– Read

via "Threatpost".
πŸ•΄ With Data Breach Costs, Time is Money πŸ•΄

The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.

πŸ“– Read

via "Dark Reading: ".