πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Election Security Threats: From Misinformation to Voting Machine Flaws ❌

From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.

πŸ“– Read

via "Threatpost".
⚠ Parents, it’s time to delete Pet Chat from your child’s LeapPad ⚠

LeapFrog has done lots to fix the security of the LeapPad. Now all that's left is for parents to scrape Pet Chat off of older tablets.

πŸ“– Read

via "Naked Security".
⚠ Instagram boots ad partner for location tracking and scraping stories ⚠

A β€œpreferred Facebook Marketing Partner” is alleged to have tracked millions of Instagram users' locations and stories.

πŸ“– Read

via "Naked Security".
πŸ•΄ It's (Still) the Password, Stupid! πŸ•΄

The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.

πŸ“– Read

via "Dark Reading: ".
⚠ Blackmailed for Bitcoin – exchange rebuffs $3.5m ransom demand ⚠

Here's a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.

πŸ“– Read

via "Naked Security".
πŸ” Why remote workers are an underrated security risk for small businesses πŸ”

Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.

πŸ“– Read

via "Security on TechRepublic".
❌ DEF CON 2019: Researchers Demo Hacking Google Home for RCE ❌

Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.

πŸ“– Read

via "Threatpost".
πŸ•΄ Significant Vulnerabilities Found in 6 Common Printers Brands πŸ•΄

In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Significant Vulnerabilities Found in 6 Common Printer Brands πŸ•΄

In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to automatically deny UAC elevation requests in Windows 10 πŸ”

To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Online Safety Tips for College Students πŸ•΄

Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 8/9 Edition πŸ”

Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the week’s infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover ❌

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.

πŸ“– Read

via "Threatpost".
❌ Hack of High-End Hotel Smart Locks Shows IoT Security Fail ❌

LAS VEGAS –  A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed β€œmobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and […]

πŸ“– Read

via "Threatpost".
πŸ•΄ State Farm Reports Credential-Stuffing Attack πŸ•΄

The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Vulnerability Risk Model Promises More-Efficient Security πŸ•΄

Taking into account more factors than the current CVSS makes for a better assessment of actual danger.

πŸ“– Read

via "Dark Reading: ".
❌ DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo ❌

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack ❌

Researchers exploit a SQLite memory corruption issue outside of a browser.

πŸ“– Read

via "Threatpost".
❌ Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster ❌

Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR ❌

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

πŸ“– Read

via "Threatpost".
πŸ” Top 10 IT trends of the last 20 years πŸ”

Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.

πŸ“– Read

via "Security on TechRepublic".