πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Developers: The Cause of and Solution to Security's Biggest Problems πŸ•΄

The everything-as-code revolution requires cybersecurity to increasingly enlist the help of developers to solve the industry's most pressing issues.

πŸ“– Read

via "Dark Reading: ".
⚠ IBM tears into Google’s β€˜quantum supremacy’ claim ⚠

Is β€˜quantum supremacy’ the moment that the rarefied world of quantum computing finally enters popular consciousness? Probably not.

πŸ“– Read

via "Naked Security".
❌ Apple Removes 17 Malicious iOS Apps From App Store ❌

Researchers have uncovered malware in 17 iOS apps that were removed from Apple's official App Store.

πŸ“– Read

via "Threatpost".
❌ ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones ❌

Consumers don't vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ

πŸ“– Read

via "Threatpost".
πŸ•΄ Messing Around with IRS Scammers πŸ•΄

Next time you just might want to answer the phone.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top Security Considerations for Insurance Companies πŸ”

When it comes to cybersecurity, the insurance industry is subject to a range of regulatory issues. Thanks to the wealth of sensitive data they handle, they're also popular targets of hackers. How can insurance firms best mitigate cybersecurity risks? We asked 20 experts.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Why Organizations Must Quantify Cyber-Risk in Business Terms πŸ•΄

The rising costs of breaches and regulatory fines are driving demand for better measurement and articulation of business impacts.

πŸ“– Read

via "Dark Reading: ".
⚠ Robot Hotel says sorry about the buggy bedside bots ⚠

Japan's Henn na Hotel says it's "modified" the bots so pervs can't exploit the ability to run unsigned code and spy on future guests.

πŸ“– Read

via "Naked Security".
⚠ Vulnerability in content distribution networks found by researchers ⚠

Researchers have found a flaw that could lead to denial of service attacks on content distribution networks around the world.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep14: Samsung fingerprint fail, mystery black boxes and invisible Android apps – Naked Security Podcast ⚠

New episode available now!

πŸ“– Read

via "Naked Security".
⚠ 5 tips for better cybersecurity ⚠

The Naked Security team gives their top 5 cybersecurity tips.

πŸ“– Read

via "Naked Security".
πŸ” Top 5 ways organizations can secure their IoT devices πŸ”

Connected devices are increasingly being targeted by hackers and cybercriminals. Deloitte shares five tips on how companies can better protect their IoT devices.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Mobile Users Targeted With Malware, Tracked by Advertisers πŸ•΄

Cybercriminals continue to seed app stores with malicious apps, advanced attackers successfully compromise mobile devices, and advertisers continue to track users, new reports show.

πŸ“– Read

via "Dark Reading: ".
❌ Samsung Rolls Out Fix For Galaxy S10 Fingerprint Sensor Glitch ❌

Samsung is reportedly rolling out fixes for a glitch that allowed anyone to dupe its Galaxy S10 fingerprint authentication sensor.

πŸ“– Read

via "Threatpost".
❌ Cash App Twitter Giveaway a Haven for Stealing Money ❌

Scammers are targeting those hoping for #CashAppFriday "blessings."

πŸ“– Read

via "Threatpost".
πŸ•΄ Eight-Hour DDoS Attack Struck AWS Customers πŸ•΄

Google Cloud Platform suffered issues around the same time as Amazon Web Services but claims they were not caused by DDoS.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ It's Time to Improve Website Identity Indicators, Not Remove Them πŸ•΄

Why Google and Mozilla are wrong about the benefits of Extended Validation certificates that aim to prevent fraud and protect user privacy.

πŸ“– Read

via "Dark Reading: ".
❌ Raccoon Malware Scavenges 100,000+ Devices to Steal Data ❌

A new information stealer is gaining rapid popularity with the cybercriminal community - leading to it infecting hundreds of millions of victims.

πŸ“– Read

via "Threatpost".
πŸ•΄ Apple Boots 17 Trojan-Laden Apps From Mobile Store πŸ•΄

Malware was designed to carry out click-fraud, Wandera says.

πŸ“– Read

via "Dark Reading: ".
πŸ›  I2P 0.9.43 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Gartner IT Symposium/Xpo 2019: The four pillars to help the enterprise conquer IoT πŸ”

IoT and software defined networking (SDN) are key components to help the enterprise move forward in a digital society.

πŸ“– Read

via "Security on TechRepublic".