πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2015-9483 (invento_responsive_gallery/architecture_template)

The ThemeMakers Invento Responsive Gallery/Architecture Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.

πŸ“– Read

via "National Vulnerability Database".
⚠ Much-attacked Baltimore uses β€˜mind-bogglingly’ bad data storage ⚠

IT workers have been storing files on their computers' hard drives. One councilman's alleged response: β€œThat can’t be right? That’s real?”

πŸ“– Read

via "Naked Security".
⚠ S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming – Naked Security Podcast ⚠

A special episode dedicated to social media culture!

πŸ“– Read

via "Naked Security".
⚠ Bitcoin money trail leads cops to β€˜world’s largest’ child abuse site ⚠

The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.

πŸ“– Read

via "Naked Security".
⚠ Some Android adware apps hide icons to make it hard to remove them ⚠

SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.

πŸ“– Read

via "Naked Security".
❌ Zappos Offers Users 10% Discount in 2012 Breach Settlement ❌

Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.

πŸ“– Read

via "Threatpost".
πŸ•΄ Learn About the Underground World of Anti-Cheats at Black Hat Europe πŸ•΄

Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ SOC Puppet: Dark Reading Caption Contest Winners πŸ•΄

Social engineering, SOC analysts, and Sock puns. And the winners are:

πŸ“– Read

via "Dark Reading: ".
⚠ Phishy text message tries to steal your cellphone account ⚠

Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!

πŸ“– Read

via "Naked Security".
πŸ•΄ Glitching: The Hardware Attack that can Disrupt Secure Software πŸ•΄

Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CenturyLink Customer Data Exposed πŸ•΄

Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.

πŸ“– Read

via "Dark Reading: ".
❌ Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise ❌

A patch is currently under revision but has not yet been incorporated into the Linux kernel.

πŸ“– Read

via "Threatpost".
❌ Major Airport Malware Attack Shines a Light on OT Security ❌

A cryptomining infection spread to half of the workstations at a major international airport.

πŸ“– Read

via "Threatpost".
πŸ” Friday Five: 10/18 Edition πŸ”

A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Execs Could Face Jail Time For Privacy Violations ❌

The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.

πŸ“– Read

via "Threatpost".
πŸ” What is a Zero Day Vulnerability? πŸ”

Find out what a Zero Day Vulnerability is and if there's anything you can do to protect yourself against them.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ In A Crowded Endpoint Security Market, Consolidation Is Underway πŸ•΄

Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Tor Weaponized to Steal Bitcoin πŸ•΄

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why compliance concerns are pushing more big companies to the cloud πŸ”

Cloud migration is accelerating as companies face compliance, security, and control concerns.

πŸ“– Read

via "Security on TechRepublic".