πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How to automatically deny UAC elevation requests in Windows 10 πŸ”

To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 7 Online Safety Tips for College Students πŸ•΄

Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 8/9 Edition πŸ”

Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the week’s infosec news with this roundup!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover ❌

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.

πŸ“– Read

via "Threatpost".
❌ Hack of High-End Hotel Smart Locks Shows IoT Security Fail ❌

LAS VEGAS –  A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed β€œmobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and […]

πŸ“– Read

via "Threatpost".
πŸ•΄ State Farm Reports Credential-Stuffing Attack πŸ•΄

The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Vulnerability Risk Model Promises More-Efficient Security πŸ•΄

Taking into account more factors than the current CVSS makes for a better assessment of actual danger.

πŸ“– Read

via "Dark Reading: ".
❌ DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo ❌

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack ❌

Researchers exploit a SQLite memory corruption issue outside of a browser.

πŸ“– Read

via "Threatpost".
❌ Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster ❌

Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR ❌

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

πŸ“– Read

via "Threatpost".
πŸ” Top 10 IT trends of the last 20 years πŸ”

Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 23 stories of the week ⚠

This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
πŸ•΄ Modern-Day SOCs: People, Process & Technology πŸ•΄

As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.

πŸ“– Read

via "Dark Reading: ".
⚠ GDPR privacy can be defeated using right of access requests ⚠

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) - right of access requests.

πŸ“– Read

via "Naked Security".
⚠ Facebook facial recognition: class action suit gets court’s go ahead ⚠

The court said facial recognition could well harm privacy rights, given its β€œdetailed, encyclopedic, and effortlessly compiled” biometrics collection.

πŸ“– Read

via "Naked Security".
⚠ Apple will hand out unlocked iPhones to vetted researchers ⚠

It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.

πŸ“– Read

via "Naked Security".
πŸ•΄ This Week in Web Application Attacks and Enterprise Threats πŸ•΄

The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".