πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Dunkin’ Donuts Gets Hit with Lawsuit Over 2015 Attack ❌

Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 9/27 Edition πŸ”

Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Cybersecurity Certification in the Spotlight Again πŸ•΄

Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.

πŸ“– Read

via "Dark Reading: ".
❌ Masad Spyware Uses Telegram Bots for Command-and-Control ❌

The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.

πŸ“– Read

via "Threatpost".
πŸ•΄ Apple Patches Multiple Vulnerabilities Across Platforms πŸ•΄

Updates address two separate issues in Apple's desktop and mobile operating systems.

πŸ“– Read

via "Dark Reading: ".
❌ iOS Exploit β€˜Checkm8’ Could Allow Permanent iPhone Jailbreaks ❌

A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cloud Vulnerability Could Let One Server Compromise Thousands πŸ•΄

A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to install and use the Cryptomator encryption tool πŸ”

Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why smart home devices may be an open invitation to hackers πŸ”

Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ The Etiquette of Respecting Privacy in the Age of IoT πŸ•΄

Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 24 stories of the week ⚠

From the fleeceware apps ripping off consumers to Microsoft's emergency IE patch - and everything in between. It's weekly roundup time.

πŸ“– Read

via "Naked Security".
⚠ Is the era of social media Likes over? ⚠

Instagram's testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.

πŸ“– Read

via "Naked Security".
πŸ” Most Fortune 500 companies still opaque about security measures πŸ”

A Bitglass survey said 52% of the world's most profitable companies do not have any language on their websites about how they protect the data of customers.

πŸ“– Read

via "Security on TechRepublic".
⚠ Social media manipulation as a political tool is spreading ⚠

Researchers say 'cyber troops' in 70 countries are using it to automate suppression, mount smear campaigns, or spread disinformation.

πŸ“– Read

via "Naked Security".
πŸ•΄ 8 Microsegmentation Pitfalls to Avoid πŸ•΄

Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Harvesting Attacks' & the Quantum Revolution πŸ•΄

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.

πŸ“– Read

via "Dark Reading: ".
❌ Critical Exim Flaw Opens Servers to Remote Code Execution ❌

A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.

πŸ“– Read

via "Threatpost".
⚠ Checkm8 jailbreak and AltStore put cracks in Apple’s walled garden ⚠

People are taking different tacks to get around Apple's tightly controlled phone rules.

πŸ“– Read

via "Naked Security".