πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Microsoft Aims to Block Firmware Attacks with New Secured-Core PCs πŸ•΄

Partnerships with Intel, Qualcomm, and AMD will bring a new layer of device security that alters the boot process to detect firmware compromise.

πŸ“– Read

via "Dark Reading: ".
❌ Gustuff Android Banker Switches Up Technical Approach ❌

A host of new features have been added to the malware.

πŸ“– Read

via "Threatpost".
πŸ” Hyperautomation, human augmentation and distributed cloud among top 10 technology trends for 2020 πŸ”

Gartner identified the top strategic technology trends likely to reach tipping points in the near future.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Russian Hackers Using Iranian APT's Infrastructure in Widespread Attacks πŸ•΄

New advisory from the UK's NCSC and the NSA throws fresh light on activity first revealed by Symantec in June.

πŸ“– Read

via "Dark Reading: ".
⚠ Google chief warns visitors about smart speakers in his home ⚠

Rick Osterloh says he discloses smart speaker use when someone enters his home, and the products should probably do so themselves.

πŸ“– Read

via "Naked Security".
⚠ Woman ordered to type in iPhone passcode so police can search device ⚠

It's not a violation of her Fifth Amendment rights, the court said, because it's a β€œforegone conclusion" that she knows her phone passcode.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Much Security Is Enough? Practitioners Weigh In πŸ•΄

Most IT and security pros surveyed say they could afford some, but not all, of the minimum security needed to protect themselves.

πŸ“– Read

via "Dark Reading: ".
❌ Survey Finds People are Privacy Hypocrites ❌

A report by HP found that most people admit to looking at others’ computer screens and documents in the workplace while still keeping their own privacy top of mind.

πŸ“– Read

via "Threatpost".
πŸ•΄ Turning Vision to Reality: A New Road Map for Security Leadership πŸ•΄

Among the takeaways from a Gartner Symposium/Xpo session: who should be accountable for data security, why security groups should stop thinking of themselves as protectors, and the consequence of locking down 'dumb' users.

πŸ“– Read

via "Dark Reading: ".
❌ Cynet’s free vulnerability assessment offering helps organizations significantly increase their security ❌

By monitoring their environment, companies can be ready to take action if any weakness – usually a software vulnerability – is found.

πŸ“– Read

via "Threatpost".
❌ Three Service Account Secrets Straight from Hackers and Security Pros ❌

A survey of nearly 300 Black Hat conference attendees this year showed strong agreement that service accounts are an attractive target.

πŸ“– Read

via "Threatpost".
πŸ•΄ Bugcrowd Enters the IT Asset Discovery Business πŸ•΄

New service searches for errant or vulnerable devices on the Internet.

πŸ“– Read

via "Dark Reading: ".
πŸ” University center to research ways to protect electronic systems from sabotage πŸ”

Led by the University of Cincinnati, the new center will work with government and industry to conduct research on how to defend electronics and embedded systems from sabotage, hacking, and spying.

πŸ“– Read

via "Security on TechRepublic".
⚠ Vatican launches smart rosary – complete with brute-force flaw ⚠

Now fixed, the Vatican's new fitness-and-prayer eRosary and its accompanying app, Click to Pray, were found to have a serious privacy bug.

πŸ“– Read

via "Naked Security".
πŸ•΄ Surviving Security Alert Fatigue: 7 Tools and Techniques πŸ•΄

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Keeping Too Many Cooks out of the Security Kitchen πŸ•΄

A good security team helps the business help itself operate more securely -- soliciting input while adhering to a unified strategy, vision, goals, and priorities.

πŸ“– Read

via "Dark Reading: ".
⚠ Storing your stuff securely in the cloud ⚠

How much of our stuff is going to the cloud? Probably a lot more than you realize. Let's look at the risks and how to mitigate them.

πŸ“– Read

via "Naked Security".
⚠ US nuclear weapons command finally ditches 8-inch floppies ⚠

The disks are part of the command centres that run the country’s nuclear missile deterrent on behalf of SACCS.

πŸ“– Read

via "Naked Security".
❌ Magecart 5 Linked to Carbanak Gang ❌

The Magecart splinter group known for supply-chain attacks appears to be tied to advanced threat actors.

πŸ“– Read

via "Threatpost".
πŸ” Shattering myths and misperceptions about biometric debit and credit cards πŸ”

Biometric cards could make a strong dent against credit card fraud, but several myths surround the technology.

πŸ“– Read

via "Security on TechRepublic".