πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Serious Security: Phishing in the cloud – the freemium way ⚠

Here's an interesting phishing trick. It's a way for crooks to get lots of customised web links without doing any programming.

πŸ“– Read

via "Naked Security".
⚠ Scammers use bogus search results to fool voice assistants ⚠

The Better Business Bureau reports that scammers have worked out how to game search results for company customer support telephone numbers.

πŸ“– Read

via "Naked Security".
⚠ Chrome users ignoring warnings to change breached passwords ⚠

If you were told that the password you had just entered was known to have been compromised in a data breach, what would you do?

πŸ“– Read

via "Naked Security".
⚠ Apple iOS update ends in jailbroken iPhones (if that’s what you want) ⚠

Programmers call it "regresssion" - when fixing a new bug unfixes an old one - and it's a jailbreakers dream!

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2014-10381

The user-domain-whitelist plugin before 1.5 for WordPress has CSRF.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-7476 (simple_fields)

The simple-fields plugin before 1.2 for WordPress has CSRF in the admin interface.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-5328

The user-access-manager plugin before 1.2 for WordPress has CSRF.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Famous con man turned cybersecurity expert urges credit freezing πŸ”

Con man turned Leonardo DiCaprio movie character turned cybersecurity expert, Frank Abagnale, talks with TechRepublic's Karen Roby about the steps people can take to protect their identity.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Legislators Seeking Answers on Student Data Priivacy πŸ”

Federal lawmakers are looking for answers from educational technology companies on how they collect and process student data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ How to Prepare for Misconfigurations that Cloud the Corporate Skies ❌

With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.

πŸ“– Read

via "Threatpost".
❌ Fortnite Ransomware Masquerades as an Aimbot Game Hack ❌

Attackers are taking aim at Fortnite's global community of 250 million gamers.

πŸ“– Read

via "Threatpost".
❌ Microsoft Offers $30K Rewards For Chromium Edge Beta Flaws ❌

Microsoft released the beta of its new Chromium-based Edge - and it is offering rewards of up to $30,000 for researchers to hunt out vulnerabilities in the browser.

πŸ“– Read

via "Threatpost".
πŸ•΄ Apple Misstep Leaves iPhones Open to Jailbreak πŸ•΄

Newest version of iOS contains a critical bug that the company had previously already patched.

πŸ“– Read

via "Dark Reading: ".
πŸ” Legislators Seeking Answers on Student Data Privacy πŸ”

Federal lawmakers are looking for answers from educational technology companies on how they collect and process student data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 3 Ways to Avoid Technical Debt in Open Source Projects πŸ•΄

Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.

πŸ“– Read

via "Dark Reading: ".
⚠ Google’s Nest webcam needs patching after flaws found ⚠

The list of vulnerabilities recently discovered by researchers relate to one model, the Nest Cam IQ Indoor camera.

πŸ“– Read

via "Naked Security".
⚠ Ransomware disrupts 22 Texas government departments ⚠

On August 16, Texas local government became the latest victim of the expanding global racket that is ransomware.

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Avoid Technical Debt in Open Source Projects πŸ•΄

Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Big Factors Putting Small Businesses At Risk πŸ•΄

Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind.

πŸ“– Read

via "Dark Reading: ".