πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Apple (Finally) Removes MacOS App Caught Stealing User Browser Histories πŸ•΄

The fact that the app likely has been exfiltrating data for years is "rather f#@&'d" up, says the security researcher who reported the issue to Apple one month ago.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜Domestic Kitten’ Mobile Spyware Campaign Aims at Iranian Targets ❌

Spreading via fake Android apps, the malware lifts a range of sensitive information from victims' devices.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Foreshadow, SGX & the Failure of Trusted Execution πŸ•΄

Trusted execution environments are said to provide a hardware-protected enclave that runs software and cannot be accessed externally, but recent developments show they fall far short.

πŸ“– Read

via "Dark Reading: ".
☒ Standard to protect against BGP hijack attacks gets first official draft ☒

NIST and DHS project publishes first draft of new BGP Route Origin Validation (ROV) standard that will help ISPs and cloud providers protect against BGP hijack attacks.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Australia's anti-encryption law will merely relocate the backdoors: Expert ☒

If the Assistance and Access Bill becomes law as it stands, it could affect 'every website that is accessible from Australia' with relatively few constraints in the government's powers.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Popular VPNs contain code execution security flaws, despite patches ☒

ProtonVPN and NordVPN contain severe bugs which impact Windows users and threaten their privacy.

πŸ“– Read

via "Latest topics for ZDNet in Security".
⚠ Monday review – the hot 24 stories of the week ⚠

From Google buying Mastercard card records and Google warning users of FBI snooping to Chrome making it harder to use Flash, and more!

πŸ“– Read

via "Naked Security".
☒ Mirai, Gafgyt IoT botnets stab systems with Apache Struts, SonicWall exploits ☒

The IoT botnets are back with a new arsenal containing a vast array of vulnerabilities.

πŸ“– Read

via "Latest topics for ZDNet in Security".
⚠ β€˜Only paper ballots by 2020!’ call experts after election tampering ⚠

The National Academy of Sciences says the US election system uses insecure technology and is fighting off attempts to destabilize it.

πŸ“– Read

via "Naked Security".
⚠ Google Chrome will now generate unique passwords for you ⚠

Chrome will now generate a unique password for users as a part of the everyday credential creation process.

πŸ“– Read

via "Naked Security".
☒ How to spot a fake ICO (in pictures) ☒

Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fraudulent and what is legitimate?

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ These are the warning signs of a fraudulent ICO ☒

Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fake and what is legitimate?

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Researcher finds new malware persistence method leveraging Microsoft UWP apps ☒

New malware persistence method works only on Windows 10 and abuses built-in UWP apps like the Cortana and People apps.

πŸ“– Read

via "Latest topics for ZDNet in Security".
⚠ North Korean programmer charged for Sony, WannaCry attacks and more ⚠

Park Jin Hyok is allegedly with Lazarus Group, a hacking team connected to attacks on a wide array of industries and public utilities.

πŸ“– Read

via "Naked Security".
⚠ Supermicro servers fixed after insecure firmware updating discovered ⚠

Researchers have sounded a warning about the security of Baseboard Management Controllers (BMCs) - a critical component that datacentres depend on to manage servers.

πŸ“– Read

via "Naked Security".
⚠ Apple’s new tool will make it easier for law enforcement to request data ⚠

Apple is planning to create an online portal that will allow law enforcement officials around the world to request information about its users more easily.

πŸ“– Read

via "Naked Security".
πŸ” The secret to successful cybersecurity programs? Training and automation πŸ”

Cybersecurity programs have drastically improved since 2017, according to a recent DomainTools survey. Here's how you can improve your cybersecurity GPA.

πŸ“– Read

via "Security on TechRepublic".
☒ LuckyMouse uses malicious NDISProxy Windows driver to target gov't entities ☒

The hacking group is covertly infecting Windows machines with Trojans by way of stolen certificates belonging to a Chinese security company.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ Exploit vendor drops Tor Browser zero-day on Twitter ☒

A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable.

πŸ“– Read

via "Latest topics for ZDNet in Security".
☒ iPhone XS: The one reason I won't buy in ☒

One of the most highly touted breakthroughs of the iPhone X--and soon to be the iPhone XS--is also its biggest drawback in usability and productivity.

πŸ“– Read

via "Latest topics for ZDNet in Security".
❌ Mirai, Gafgyt Botnets Return to Target Infamous Apache Struts, SonicWall Flaws ❌

By implementing the "Equifax bug," it's the first known time a Mirai IoT botnet variant has targeted an Apache Struts vulnerability.

πŸ“– Read

via "The first stop for security news | Threatpost ".