πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2011-2717

The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2523

vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-2515

PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which may allow installation of non-trusted packages and execution of arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
⚠ Twitter says it won’t delete tweets from those who have died ⚠

It "was a miss on our part", Twitter said.

πŸ“– Read

via "Naked Security".
⚠ HPE warns of impending SSD disk doom ⚠

The company has revealed that many of its SSDs are set to permanently fail by default after 32,768 hours of operation.

πŸ“– Read

via "Naked Security".
⚠ Ransomware attack freezes health records access at 110 nursing homes ⚠

In some cases, nurses can’t update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.

πŸ“– Read

via "Naked Security".
⚠ Kids’ smartwatch security tracker can be hacked by anyone ⚠

For researchers at testing outfit AV-Test, the SMA M2 kids’ smartwatch is just the tip of an iceberg of terrible security.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep18: Missing cryptoqueen, festive phishing and can the web be saved? – Naked Security Podcast ⚠

New episode available now!

πŸ“– Read

via "Naked Security".
πŸ” Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea πŸ”

As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.

πŸ“– Read

via "Security on TechRepublic".
❌ ThreatList: Healthcare Breaches Spike in October ❌

38 million consumer health records have been exposed so far in 2019.

πŸ“– Read

via "Threatpost".
πŸ” The sinister timing of deepfakes and the 2020 election πŸ”

Education and legislation are needed to combat the significant threat of deepfakes.

πŸ“– Read

via "Security on TechRepublic".
⚠ Stay safe on Black Friday – and the rest of the year, too! ⚠

Watch our latest Naked Security Live video for some handy and practical cybersecurity tips - for Black Friday and beyond.

πŸ“– Read

via "Naked Security".
⚠ Master Go player retires citing AI supremacy ⚠

Master Go player Lee Se-dol has handed in his stones after deciding that there's just no way to beat a machine when playing the ancient Chinese board game.

πŸ“– Read

via "Naked Security".
⚠ Pressure mounts for federal privacy law with second bill ⚠

Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.

πŸ“– Read

via "Naked Security".
⚠ Adobe’s Magento Marketplace suffers data breach ⚠

Adobe’s Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.

πŸ“– Read

via "Naked Security".
⚠ US tightens rules on drone use in policy update ⚠

When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know it’s on the case.

πŸ“– Read

via "Naked Security".
❌ Amazon Plans Ring Facial Recognition-Based β€˜Watch List:’ Report ❌

Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.

πŸ“– Read

via "Threatpost".
⚠ Netflix account freeze – don’t click, it’s a scam! ⚠

The telltale signs are all there... but if you're in a hurry, this Netflix scam passes the "visual appeal" test.

πŸ“– Read

via "Naked Security".
πŸ” How credential stuffing attacks work, and how to prevent them πŸ”

Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.

πŸ“– Read

via "Security on TechRepublic".