πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Americans Fed Up With Lack of Data Privacy πŸ•΄

Eight out of every 10 US adults are worried over their inability to control how data about them is used, a new Pew Research survey shows.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2008-7273

A symlink issue exists in Iceweasel-firegpg before 0.6 due to insecure tempfile handling.

πŸ“– Read

via "National Vulnerability Database".
⚠ Booter boss behind millions of DDoS-for-hire attacks jailed ⚠

The US is also juicing him for over half a million in profits from multiple DDoS-for-hire services.

πŸ“– Read

via "Naked Security".
⚠ Sophos 2020 Threat Report: AI is the new battleground ⚠

The SophosLabs 2020 Threat Report highlights a growing battle as smart automation technologies continue to evolve.

πŸ“– Read

via "Naked Security".
⚠ Ho Ho OUCH! There are 4x more fake retailer sites than real ones ⚠

Beware, holiday shoppers! The phishers hiding under typosquatting domains are waiting for your keyboard fumbles.

πŸ“– Read

via "Naked Security".
⚠ Brand new Android smartphones shipped with 146 security flaws ⚠

If you think brand new, just-out-of-the-box Android smartphones are immune from security vulnerabilities - think again.

πŸ“– Read

via "Naked Security".
❌ Macy’s Suffers Data Breach by Magecart Cybercriminals ❌

Obfuscated Magecart script was discovered on two Macys.com webpages, scooping up holiday shoppers' payment card information.

πŸ“– Read

via "Threatpost".
πŸ›  Bing.com Hostname / IP Enumerator 1.0 πŸ› 

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ A Security Strategy that Centers on Humans, Not Bugs πŸ•΄

The industry's fixation on complex exploits has come at the expense of making fundamentals easy and intuitive for end users.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ If You Never Cared About Security ... πŸ•΄

Oh, I used to feel that way. (Until a BEC attack.)

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Magecart Hits Macy's: Retailer Discloses Data Breach πŸ•΄

The retail giant discovered malicious code designed to capture customer data planted on its payment page.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Windows Update’ Installs Cyborg Ransomware ❌

A malicious spam campaign that informs victims it contains a β€œcritical Windows update” instead leads to the installation of Cyborg ransomware, researchers have found. Further, they were able to access its builder, which can be used to create malware variants. The email-based threat, discovered recently by researchers at Trustwave, is unique in a few ways, […]

πŸ“– Read

via "Threatpost".
πŸ” 82% of SMB execs expect employees to put business devices at risk with holiday shopping πŸ”

Nearly half of executives surveyed don't believe their employees would be able to spot a bad actor posing as an online retailer, Zix-AppRiver found.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned πŸ•΄

A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself.

πŸ“– Read

via "Dark Reading: ".
πŸ” Air Force hires Trueface for facial recognition on bases πŸ”

Trueface will provide Air Force bases with systems that can identify faces, license plates and guns.

πŸ“– Read

via "Security on TechRepublic".
πŸ” FBI Agent: Ex-Monsanto Employee Stole Trade Secrets πŸ”

When he was first detained at the airport, the employee was found with six files containing trade secret data on a storage device connected to his laptop.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Most Companies Lag Behind '1-10-60' Benchmark for Breach Response πŸ•΄

Average company needs 162 hours to detect, triage, and contain a breach, according to a new CrowdStrike survey.

πŸ“– Read

via "Dark Reading: ".
❌ McDonalds-Themed Facebook Ads Serve Up Banking Trojans ❌

The malware has backdoor functionality and the ability to steal payment cards and credentials.

πŸ“– Read

via "Threatpost".
πŸ•΄ TPM-Fail: What It Means & What to Do About It πŸ•΄

Trusted Platform Modules are well-suited to a wide range of applications, but for the strongest security, architect them into "defense-in-depth" designs.

πŸ“– Read

via "Dark Reading: ".
❌ Google Discloses Android Camera Hijack Hack ❌

Google has disclosed a now-fixed issue that enabled third-party apps to access a disturbing set of permissions for its Camera App built into Android phones.

πŸ“– Read

via "Threatpost".