πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Android camera bug could have turned phones against their users ⚠

Google has patched a bug in the Android camera app that allowed other applications to bypass the strict controls on camera and audio access.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 'Department of No': Why CISOs Need to Cultivate a Middle Way πŸ•΄

A chief information security officer's job inherently involves conflict, but a go-along-to-get-along approach carries its own vulnerabilities and risks.

πŸ“– Read

via "Dark Reading: ".
⚠ DNS-over-HTTPS is coming to Windows 10 ⚠

Microsoft will soon add the ability to use DNS-over-HTTPS and DNS-over-TLS into its networking client.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Top Nontechnical Degrees for Cybersecurity πŸ•΄

A computer science degree isn't the only path into a cybersecurity career.

πŸ“– Read

via "Dark Reading: ".
❌ Gnip Banking Trojan Shows Ongoing, Aggressive Development ❌

The mobile malware, which incorporates Anubis source code, could evolve into a fully fledged spyware in the future.

πŸ“– Read

via "Threatpost".
❌ Linux Webmin Servers Under Attack by Roboto P2P Botnet ❌

A newly-discovered peer-to-peer (P2P) botnet has been found targeting a remote code execution vulnerability in Linux Webmin servers.

πŸ“– Read

via "Threatpost".
πŸ” 75% of developers worry about app security, but half lack dedicated security experts on their team πŸ”

The majority of developers view security as integral to the coding and development process, but lack the support of a security expert, Whitehat Security found.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2009-5047 (debian_linux, jetty)

Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a "java.lang.NumberFormatException" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The same attack in 1) can be exploited by requesting a page using an HTTP request "Content-Length" header set to a letteral string.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Increases Top Android Hacking Prize to $1M πŸ•΄

Google expands its Android Security Rewards program and multiplies its top cash prize from $200,000 to $1 million.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Fundamentals for Better Security and IT Management πŸ•΄

Nail these security fundamentals, and your organization will be well-positioned to succeed next year and in the years to come.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Outlook for Android Bug Opens Door to XSS ❌

Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks.

πŸ“– Read

via "Threatpost".
πŸ” Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it πŸ”

Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).

πŸ“– Read

via "Security on TechRepublic".
πŸ” Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it πŸ”

Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ In the Market for a MSSP? Ask These Questions First πŸ•΄

Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Government Agency Partners on New Tool for Election Security πŸ•΄

The Cybersecurity and Infrastructure Security Agency has partnered with VotingWorks on an open source tool to aid election result audits.

πŸ“– Read

via "Dark Reading: ".
❌ Senators Demand Amazon Disclose Ring Privacy Policies ❌

Amazon's Ring data collection policies are in the spotlight.

πŸ“– Read

via "Threatpost".
πŸ•΄ Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities πŸ•΄

The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.

πŸ“– Read

via "Dark Reading: ".
⚠ Convicted Nigerian fraudster keeps a-fraudin’ from behind bars ⚠

He was supposed to be serving a 24-year sentence in the "maximum security" prison, not continuing the fraud... and going to parties.

πŸ“– Read

via "Naked Security".
⚠ Why do cryptocurrency scams work and how do you avoid them? ⚠

What are ICOs, why are they so popular and why do crooks love them so much?

πŸ“– Read

via "Naked Security".
❌ Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip ❌

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

πŸ“– Read

via "Threatpost".