πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” How hacktivist groups pose a global cybersecurity threat πŸ”

Andrea Little Limbago, chief social scientist at Endgame, discusses hacktivist groups, cybersecurity trends, and how we can prepare for cyberattacks with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cathay Pacific Suffers Largest Airline Breach πŸ•΄

Breach of Hong Kong-based airline compromises personal information of 9.4 million passengers.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to install and run the Maltrail detection system on Ubuntu Server 18.04 πŸ”

The Maltrail malicious behavior detection system eases the burden of constant vigilance on your Linux server.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Side-Channel Attack Exposes User Accounts on Facebook, XBox, Other Social Sites πŸ•΄

Researcher will demonstrate at Black Hat Europe his team's recent discovery: a way to exploit popular user-blocking feature on social media and other sites.

πŸ“– Read

via "Dark Reading: ".
πŸ” Election hacking: The myths vs. realities πŸ”

Cris Thomas, space rogue, global strategy lead at IBM X-Force Red, discusses the myths and realities of hacking election machines with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” What attackers want when they hack email accounts πŸ”

Mark Risher, Google's director of product management for identity and account security, explains what hackers are looking for and how Google is ramping up account security.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Retail Fraud Spikes Ahead of the Holidays πŸ•΄

Researchers note massive increases in retail goods for sale on the black market, retail phishing sites, and malicious applications and social media profiles.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Free Decryption Tool for GandCrab πŸ•΄

Tool rescues GandCrab victims from malicious encryption.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ County Election Websites Can Be Easily Spoofed to Spread Misinformation πŸ•΄

Majority of county sites in 20 key swing states have non-.gov domains and don't enforce use of SSL, McAfee researchers found.

πŸ“– Read

via "Dark Reading: ".
⚠ How to become a Monero million(th)aire in just 20 minutes [PODCAST] ⚠

Here's Episode 7 of the Naked Security podcast - enjoy.

πŸ“– Read

via "Naked Security".
πŸ” Hackers selling exploits to law enforcement agencies have poor security practices πŸ”

Startups selling vulnerabilities, exploit kits, and access to personal data to government agencies have a poor record of securing their own platforms.

πŸ“– Read

via "Security on TechRepublic".
⚠ Facebook’s stopped 8.7m nude images of children in 3 months ⚠

Facebook blocked 8.7m images of child nudity and exploitative content in 3 months.

πŸ“– Read

via "Naked Security".
⚠ Former Facebook security chief calls out Apple for privacy hypocrisy ⚠

Tim Cook's warnings about an "industrial data complex" have been met with accusations of hypocrisy from Facebook's former security supremo.

πŸ“– Read

via "Naked Security".
⚠ Facebook fined £500K for Cambridge Analytica saga ⚠

A Β£500k is the best the Information Commissioner's Office could do under the old Data Protection Act.

πŸ“– Read

via "Naked Security".
⚠ Apple and Samsung punished for slowing down old smartphones ⚠

Software updates aren't supposed to make things worse.

πŸ“– Read

via "Naked Security".
πŸ” Infographic: How to solve the cybersecurity talent gap in your organization πŸ”

Filling cybersecurity gaps remains a top challenge for executives, according to an infographic from Digital Guardian.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to create an encrypted vault with KDE Vaults πŸ”

If you're looking for a way to seamlessly work with encryption on the desktop, give KDE vaults a try.

πŸ“– Read

via "Security on TechRepublic".
<b>&#10068; Ransomware attacks through Remote Access is on rise. Secure your system now!! &#10068;</b>

<code>Estimated reading time: 4 minutesOnce again ransomware attacks are on the rise and this can leave your systems vulnerable to critical data loss and breach. In fact, the recent outbreak of ransomware allows cyber criminals to easily gain access to your computer through Remote Desktop using brute-force technique, which is capable of cracking weak passwords. With this post, we wish to help you with essential steps and corrective measures you can take, to protect your computer(s) against ransomware and RDP brute-force attacks. However, before we get into the steps to follow, it can be helpful to get a brief understanding about RDP Brute-Force attacks first. What is RDP Brute Force Attack? A RDP brute-force attack is basically a kind of ransomware attack that makes use of Remote Desktop Protocol (RDP). Attackers scan a list of IPs to find the default RDP port 3389 that is open for connection. Once the port is discovered, the attacker launches the brute-force attack. This is basically a trial & error technique of User ID and password guessing, where the attacker tries a series of commonly used credentials, common word combinations and dictionary words to break through weak passwords. To make things easier for attackers, there are numerous tools readily available that can perform these RDP brute forcing and port scanning with ease. Once attackers gain access, all they have to do is to disable your system’s antivirus (even if updated) and infect your system. Fortunately, Quick Heal products comes with a security feature that can protect your system against such brute-force attacks. We have already released an update to modify rule in Quick Heal’s Firewall that automatically turns off your RDP connections for security reasons and you are sorted. This will discourage hackers from remotely accessing your system. With the update already released, there can be 2 possible case scenarios: Case #1 I do not wish to use RDP If you already have Quick product installed on your system, then you have absolutely nothing to worry about. Quick Heal’s Firewall Protection Feature can effectively block RDP attempt. As we have already rolled out an update to disable RDP connection, if your Quick Heal product’s virus database version is 25th October or later, be assured that you are already protected from RDP attacks.   *In case of any queries, feel free to call us on our toll-free no. 1800-121-7377 and our support engineers would be glad to help you with the issue. You may also visit http://bit.ly/QHChat to chat with us online. Case #2 I want to continue using RDP Just in case, it is essential for you to continue using RDP, but at the same time you wish to ensure its security, then you can manually configure the Firewall Protection Feature to configure RDP connection with the help of following steps: Open Quick Heal Dashboard => Select Internet and Network => Firewall Protection=> Advanced Settings – Configure=> Traffic Rules.               In the Traffic rule window, click on Add for adding an exception. Give any Name for the rule e.g. Remote Desktop and select Next In the β€˜Local IP Address’ screen, no changes are to be made, just click β€˜Next’ In the Local TCP/UDP Port window enter the RDP port in the Specific port option and click Next. By default the RDP port is 3389. Mention the same if you have not changed it. In the Remote IP Address enter the IP address of the system from which you would want to accept RDP connections. It is recommended to configure IP address from which RDP connections are to be allowed. However, if you do not wish to restrict access to specific IP address, select β€˜Any IP Address’ and click Next. If you wish to restrict access to range of IP addresses, select β€˜IP Address Range’ and specify IP address here. Eg. 192.168.0.1 to 192.168.0.255. Select Next for the Remote TCP/UDP port Select an action to be taken as β€˜Allow’ in the…
πŸ” How information security and cyber tactics has evolved πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the development of cyber tactics with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How information security and cyber tactics has evolved πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the development of cyber tactics with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How Colorado voting became a cybersecurity leader long before Russians tried to hack it πŸ”

Colorado offers extensive election official cybersecurity training, paper ballots, and a strong auditing system, giving it top marks in election security.

πŸ“– Read

via "Security on TechRepublic".