πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google Calendar Settings Gaffes Exposes Users’ Meetings, Company Details ❌

A configuration setting in Google Calendars does not sufficiently warn users that it makes their calendars public to all, a researcher argues.

πŸ“– Read

via "Threatpost".
❌ Cisco Extends Patch for IPv6 DoS Vulnerability ❌

The bug was first found in 2016.

πŸ“– Read

via "Threatpost".
πŸ•΄ 15K Private Webcams Could Let Attackers View Homes, Businesses πŸ•΄

Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to avoid the dreaded Video4Linux flaw in Android πŸ”

With Google dragging their feet on the fix for Video4Linux, you might consider revoking camera permissions for certain apps.

πŸ“– Read

via "Security on TechRepublic".
❌ AMD Radeon Graphics Cards Open VMware Workstations to Attack ❌

Bug impacts VMware Workstation 15 running 64-bit versions of Windows 10 as the guest VM.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybercriminal's Black Market Pricing Guide πŸ•΄

Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect yourself against web miners πŸ”

While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
πŸ” DNS amplification attacks increase by 1,000% since 2018 πŸ”

Researchers said a new defense system is fueling a wave of DNS amplification attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Five Common Cloud Configuration Mistakes πŸ•΄

It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.

πŸ“– Read

via "Dark Reading: ".
πŸ” Australian not-for-profit's encryption solution to privacy breaches πŸ”

An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Snowden Sued by US Government Over His New Book πŸ•΄

Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.

πŸ“– Read

via "Dark Reading: ".
πŸ” Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case πŸ”

Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Any Advice for Assessing Third-Party Risk? πŸ•΄

Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.

πŸ“– Read

via "Dark Reading: ".
❌ Panda Threat Group Mines for Monero With Updated Payload, Targets ❌

Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.

πŸ“– Read

via "Threatpost".
πŸ•΄ MITRE Releases 2019 List of Top 25 Software Weaknesses πŸ•΄

The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done' πŸ•΄

Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say.

πŸ“– Read

via "Dark Reading: ".
⚠ Teenage gamer jailed over lethal swatting ⚠

Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.

πŸ“– Read

via "Naked Security".
⚠ Common storage and router devices are still hopelessly broken ⚠

Don’t be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device - the chances are that it’s no more secure than its predecessors.

πŸ“– Read

via "Naked Security".