πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Ohio taps college cybersecurity experts to audit election systems before 2018 midterms πŸ”

Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ One-Third of US Adults Hit with Identity Theft πŸ•΄

That's double the global average and more than three times the rate of French and German adults.

πŸ“– Read

via "Dark Reading: ".
❌ Adaptable, All-in-One Android Trojan Shows the Future of Malware ❌

GPlayed may be the new face of malware -- flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Not All Multifactor Authentication Is Created Equal πŸ•΄

Users should be aware of the strengths and weaknesses of the various MFA methods.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Adds New Identity, Security Tools to Cloud Platform πŸ•΄

A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Credential Theft Spikes by Triple Digits in U.S. ❌

Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors ❌

Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ FitMetrix Exposes Millions of Customer Details, Accessed by Criminals ❌

Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Most Malware Arrives Via Email πŸ•΄

Watch out for messages with the word "invoice" in the subject line, too.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Window Snyder Shares Her Plans for Intel Security πŸ•΄

The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Chinese Intelligence Officer Under Arrest for Trade Secret Theft πŸ•΄

Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up πŸ•΄

Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-1231

IBM BigFix Platform 9.5 - 9.5.9 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123910.

πŸ“– Read

via "National Vulnerability Database".
⚠ Payment skimmers sneaking on to websites via third party code ⚠

Whatever Magecart is, it’s been blamed for several high-profile payment card breaches this summer.

πŸ“– Read

via "Naked Security".
⚠ Experian credit-freeze PINs could be revealed by a simple trick ⚠

The credit bureaus' struggles with PINs continue...

πŸ“– Read

via "Naked Security".
πŸ•΄ 12 Free, Ready-to-Use Security Tools πŸ•΄

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

πŸ“– Read

via "Dark Reading: ".
⚠ 35 state attorney generals tell FCC to pull the plug on robocalls ⚠

The AGs want the FCC to adopt SHAKEN and STIR.

πŸ“– Read

via "Naked Security".
⚠ What Kanye West can teach us about passcodes ⚠

Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that β€œour president should be flying in,” West casually unlocked it using the passcode β€˜000000’.

πŸ“– Read

via "Naked Security".
πŸ•΄ 12 Free, Ready-to-Use Security Tools πŸ•΄

There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.

πŸ“– Read

via "Dark Reading: ".
❌ Facebook Bans More Than 800 Accounts in Disinformation Purge ❌

The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Threat Hunters & Security Analysts: A Dynamic Duo πŸ•΄

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

πŸ“– Read

via "Dark Reading: ".