πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover ❌

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.

πŸ“– Read

via "Threatpost".
❌ Hack of High-End Hotel Smart Locks Shows IoT Security Fail ❌

LAS VEGAS –  A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed β€œmobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and […]

πŸ“– Read

via "Threatpost".
πŸ•΄ State Farm Reports Credential-Stuffing Attack πŸ•΄

The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Vulnerability Risk Model Promises More-Efficient Security πŸ•΄

Taking into account more factors than the current CVSS makes for a better assessment of actual danger.

πŸ“– Read

via "Dark Reading: ".
❌ DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo ❌

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack ❌

Researchers exploit a SQLite memory corruption issue outside of a browser.

πŸ“– Read

via "Threatpost".
❌ Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster ❌

Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.

πŸ“– Read

via "Threatpost".
❌ DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR ❌

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

πŸ“– Read

via "Threatpost".
πŸ” Top 10 IT trends of the last 20 years πŸ”

Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.

πŸ“– Read

via "Security on TechRepublic".
⚠ Monday review – the hot 23 stories of the week ⚠

This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything we've written in the last seven days - it's weekly roundup time.

πŸ“– Read

via "Naked Security".
πŸ•΄ Modern-Day SOCs: People, Process & Technology πŸ•΄

As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.

πŸ“– Read

via "Dark Reading: ".
⚠ GDPR privacy can be defeated using right of access requests ⚠

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) - right of access requests.

πŸ“– Read

via "Naked Security".
⚠ Facebook facial recognition: class action suit gets court’s go ahead ⚠

The court said facial recognition could well harm privacy rights, given its β€œdetailed, encyclopedic, and effortlessly compiled” biometrics collection.

πŸ“– Read

via "Naked Security".
⚠ Apple will hand out unlocked iPhones to vetted researchers ⚠

It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.

πŸ“– Read

via "Naked Security".
πŸ•΄ This Week in Web Application Attacks and Enterprise Threats πŸ•΄

The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Is My Development Environments at Risk? πŸ•΄

Development environments pose a few unique risks to the organization.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 6 Security Considerations for Wrangling IoT πŸ•΄

The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.

πŸ“– Read

via "Dark Reading: ".
πŸ” The unbelievable life story of Frank Abagnale πŸ”

Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.

πŸ“– Read

via "Security on TechRepublic".