πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Digital transformation: Why companies need a sense of urgency πŸ”

TechRepublic's Karen Roby talks with futurist Brian Solis about the trends shaping digital transformation.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Smart contracts and blockchain will provide needed trust, says Princeton professor πŸ”

Princeton computer science professor Ed Felten says blockchain will enable smart contracts that provide trust to company systems in the future, but there are some myths and misconceptions.

πŸ“– Read

via "Security on TechRepublic".
❌ Bedside Hotel Robot Hacked to Stream In-Room Video ❌

An unsecured NFC tag opens a door to trivial exploitation of robots inside Japanese hotels.

πŸ“– Read

via "Threatpost".
πŸ” Mobile malware increasingly being used for espionage by state-sponsored groups πŸ”

State-sponsored groups take advantage of the lack of effective mobile malware solutions to target mobile users, according to a new report from BlackBerry.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use RoboForm to manage and synchronize your browser bookmarks πŸ”

RoboForm is more than a password manager--you can also use it as a tool for syncing your browser bookmarks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Oracle Releases Free Tool for Monitoring Internet Routing Security πŸ•΄

IXP Filter Check gives Internet Exchange Points a way to verify whether they are properly filtering out incorrect and malicious routes.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Tough Choices πŸ•΄

If you could only protect one category of your organization's data, what would it be?

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2014-2304

A vulnerability in version 0.90 of the Open Floodlight SDN controller software could result in a denial of service attack and crashing of the controller service. This effect is the result of a flaw in OpenFlow protocol processing, where specific malformed and mistimed FEATURES_REPLY messages cause the controller service to not delete switch and port data from its internal tracking structures.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2002-2439

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ IoTopia Framework Aims to Bring Security to Device Manufacturers πŸ•΄

GlobalPlatform launches an initiative to help companies secure connected devices and services across markets.

πŸ“– Read

via "Dark Reading: ".
πŸ” Gartner IT Symposium/Xpo 2019: Security and regulatory concerns with public cloud πŸ”

How IBM works with clients in regulated industries to scale AI across public clouds and protect data.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Wireshark Analyzer 3.0.6 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Stalker app maker Retina-X settles FTC charges ⚠

It's the first time we've gone after a stalking app, the FTC said. In this case, that would be a stalking app that got breached - twice.

πŸ“– Read

via "Naked Security".
πŸ•΄ Poll Results: Smart Enterprises, Dumb Homes πŸ•΄

At work, security pros have their fingers on some pretty cutting-edge technology. But are their homes souped up, too?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Developers: The Cause of and Solution to Security's Biggest Problems πŸ•΄

The everything-as-code revolution requires cybersecurity to increasingly enlist the help of developers to solve the industry's most pressing issues.

πŸ“– Read

via "Dark Reading: ".
⚠ IBM tears into Google’s β€˜quantum supremacy’ claim ⚠

Is β€˜quantum supremacy’ the moment that the rarefied world of quantum computing finally enters popular consciousness? Probably not.

πŸ“– Read

via "Naked Security".
❌ Apple Removes 17 Malicious iOS Apps From App Store ❌

Researchers have uncovered malware in 17 iOS apps that were removed from Apple's official App Store.

πŸ“– Read

via "Threatpost".
❌ ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones ❌

Consumers don't vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ

πŸ“– Read

via "Threatpost".
πŸ•΄ Messing Around with IRS Scammers πŸ•΄

Next time you just might want to answer the phone.

πŸ“– Read

via "Dark Reading: ".