πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Getting ready for the end of Basic Authentication in Exchange Web Services πŸ”

Prepare your applications and users for big changes on 13 October 2020.

πŸ“– Read

via "Security on TechRepublic".
⚠ Instagram hides β€˜false’ content, unless it’s from a politician ⚠

Instagram's expanding its fact-checking program but, like Facebook, says it won't keep political speech away from "public debate and scrutiny."

πŸ“– Read

via "Naked Security".
⚠ Proposed standard would make warrant canaries machine-readable ⚠

For years, organisations have been using a common tactic called the warrant canary to warn people that the government has secretly demanded access to their private information. Now, a proposed standard could make this tool easier to use.

πŸ“– Read

via "Naked Security".
⚠ Get in line! 38,000 students and staff forced to queue for new passwords ⚠

It's not a bread line, and it's not a line to see Santa - it's an analog response to a nasty cyber attack.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep21: Plundervolt, domain name gunfight, Facebook snubs Congress – Naked Security Podcast ⚠

Latest podcast episode - listen now!

πŸ“– Read

via "Naked Security".
⚠ Chrome 79 patched after Android WebView app chaos ⚠

Google has rushed out a fix for a bug in the Android version of Chrome that left some app users unable to access accounts or retrieve stored data.

πŸ“– Read

via "Naked Security".
πŸ” What is Identity and Access Management (IAM)? πŸ”

Learn about identity and access management (IAM), how IAM works, and why organizations should have IAM in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Why 5G harbors multiple security weaknesses πŸ”

Certain security flaws in 2G, 3G, and 4G have not been resolved, and 5G is vulnerable as well, says a new report from Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How a Password-Free World Could Have Prevented the Biggest Breaches of 2019 πŸ•΄

If history has taught us anything, it's that hackers can (and will) compromise passwords. Innovation in authentication technology is poised to change that in the coming year.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Cloud External Key Manager Now in Beta πŸ•΄

Cloud EKM is designed to separate data at rest from encryption keys stored in a third-party management system.

πŸ“– Read

via "Dark Reading: ".
❌ Honda Leaks Data of 26K North American Customers ❌

The leaky database was online for about a week, exposing customers' vehicles information and personal identifiable information.

πŸ“– Read

via "Threatpost".
⚠ Hiding malware downloads in Taylor Swift pics! New SophosLabs report ⚠

Just because a malware family isn't all over the headlines doesn't mean it isn't interesting... or important... or dangerous!

πŸ“– Read

via "Naked Security".
πŸ•΄ Privacy Requirements & Penalties Grow, Causing Firms to Struggle πŸ•΄

Between Europe's and California's privacy laws, companies have a complex landscape to navigate in 2020. Even data-mature industries, such as financial services, see problems ahead.

πŸ“– Read

via "Dark Reading: ".
❌ The Scammer Force is Strong with Star Wars: The Rise of Skywalker ❌

Phishers are using "black SEO" to lure users in to malicious downloads masquerading as the latest Star Wars movie.

πŸ“– Read

via "Threatpost".
πŸ” "123456" again claims top spot as worst password of the year πŸ”

Other poor choices include "password," "princess," "qwerty," "iloveyou" and "welcome," according to the 2019 list from SplashData.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Global Cyber Alliance Launches New Security Efforts for Election Officials πŸ•΄

The Craig Newmark Trustworthy Internet and Democracy Program will develop security toolkits -- and enhance existing ones -- ahead of the 2020 presidential election.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to block fingerprinting in Firefox πŸ”

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to block fingerprinting in Firefox πŸ”

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Patch Management: How to Prioritize an Underserved Vulnerability πŸ•΄

Why is one of the biggest problems in cybersecurity also one that CISOs largely ignore? Here are three reasons and a road map to a modern approach.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against ad-based JavaScript exploits πŸ”

Cybercriminals continue to exploit weaknesses in JavaScript to try to steal sensitive data from consumers through advertising, according to DEVCON.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ China-Based Cyber Espionage Group Targeting Orgs in 10 Countries πŸ•΄

Dozens of organizations across multiple sectors have become victims of APT20 in the past two years.

πŸ“– Read

via "Dark Reading: ".