πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” "123456" again claims top spot as worst password of the year πŸ”

Other poor choices include "password," "princess," "qwerty," "iloveyou" and "welcome," according to the 2019 list from SplashData.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Global Cyber Alliance Launches New Security Efforts for Election Officials πŸ•΄

The Craig Newmark Trustworthy Internet and Democracy Program will develop security toolkits -- and enhance existing ones -- ahead of the 2020 presidential election.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to block fingerprinting in Firefox πŸ”

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to block fingerprinting in Firefox πŸ”

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Patch Management: How to Prioritize an Underserved Vulnerability πŸ•΄

Why is one of the biggest problems in cybersecurity also one that CISOs largely ignore? Here are three reasons and a road map to a modern approach.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your organization against ad-based JavaScript exploits πŸ”

Cybercriminals continue to exploit weaknesses in JavaScript to try to steal sensitive data from consumers through advertising, according to DEVCON.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ China-Based Cyber Espionage Group Targeting Orgs in 10 Countries πŸ•΄

Dozens of organizations across multiple sectors have become victims of APT20 in the past two years.

πŸ“– Read

via "Dark Reading: ".
πŸ” New malware dropper is a "hornet's nest" of dangerous software πŸ”

The newly discovered Legion Loader infects computers with a huge quantity and variety of malware, making it a serious threat.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to analyze the Apache log file with Goaccess πŸ”

Add terminal- and web-based Apache access.log view with Goaccess.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Real-Time Payment Platforms Offer Fast Cash & Fast Fraud πŸ•΄

Real-time payment services like The Clearing House and Zelle will completely clear transactions in an instant...but account takeover attackers love that speed as much as you do.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to analyze the Apache log file with Goaccess πŸ”

Add terminal- and web-based Apache access.log view with Goaccess.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Edge Feature Section πŸ•΄

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book

πŸ“– Read

via "Dark Reading: ".
❌ 267M Facebook Users’ Phone Numbers Exposed Online ❌

Researchers believe that criminals were able to obtain personal information for millions of Facebook users.

πŸ“– Read

via "Threatpost".
πŸ›  Faraday 3.10.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” Phishers prey on fans of latest Star Wars film πŸ”

83 users have already been affected by 65 malicious files disguised as copies of Star Wars: The Rise of Skywalker according to Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
⚠ Hello β€˜123456,’ my old friend, I’ve come to talk with you again ⚠

Once again, it reins supreme as the #1 smelliest old fish of a password on the list of ones that most frequently turn up in data breaches.

πŸ“– Read

via "Naked Security".
⚠ What’s behind Putin’s old-school operating system? ⚠

Reports surfaced this week that the president of Russia is still using Windows XP as his primary operating system.

πŸ“– Read

via "Naked Security".
⚠ Facebook’s location tracking policy still worries US Senators ⚠

Does Facebook continue to track the locations of its users even when they’ve told it not to? Yes!

πŸ“– Read

via "Naked Security".
⚠ Twitter trolls attack epileptics with seizure-inducing images ⚠

They hijacked the Epilepsy Foundation's hashtags and name during national epilepsy awareness month, when the most people follow the feed.

πŸ“– Read

via "Naked Security".
❌ Apple’s Bug Bounty Opens for Business, $1M Payout Included ❌

The tech giant is looking for full working exploits with any vulnerability submission.

πŸ“– Read

via "Threatpost".
πŸ•΄ As Hackers Target Mobile Payment Apps, Here's How to Keep Them at Bay πŸ•΄

A little vigilance helps retailers reduce and prevent three of the most common kinds of mobile app fraud

πŸ“– Read

via "Dark Reading: ".