πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook’s location tracking policy still worries US Senators ⚠

Does Facebook continue to track the locations of its users even when they’ve told it not to? Yes!

πŸ“– Read

via "Naked Security".
⚠ Twitter trolls attack epileptics with seizure-inducing images ⚠

They hijacked the Epilepsy Foundation's hashtags and name during national epilepsy awareness month, when the most people follow the feed.

πŸ“– Read

via "Naked Security".
❌ Apple’s Bug Bounty Opens for Business, $1M Payout Included ❌

The tech giant is looking for full working exploits with any vulnerability submission.

πŸ“– Read

via "Threatpost".
πŸ•΄ As Hackers Target Mobile Payment Apps, Here's How to Keep Them at Bay πŸ•΄

A little vigilance helps retailers reduce and prevent three of the most common kinds of mobile app fraud

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ambiguity Around CCPA Will Lead to a Slow Start in 2020 πŸ•΄

But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5639

LibreOffice and OpenOffice automatically open embedded content

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-3409

ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Someone's Been Very Naughty ... πŸ•΄

Cybercriminals expose Santa's naughty list -- names and reasons -- on the Internet. "Ho, ho, ho! God, what a mess!" exclaims a source who requested anonymity.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Should I Have a Security Travel Policy to Protect Devices and Sensitive Data? πŸ•΄

Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.

πŸ“– Read

via "Dark Reading: ".
❌ Wawa Data Breach: Malware Stole Customer Payment Card Info ❌

Wawa said that payment-processing system malware had potentially affected all 850 of its locations.

πŸ“– Read

via "Threatpost".
❌ It’s Time for Your SOC to Level Up ❌

Artificial intelligence can provide manpower, context and risk assessment.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Traits to Develop for Cybersecurity Success πŸ•΄

Cultivate these half-dozen qualities and watch your career soar.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable SSH login on macOS πŸ”

If you have a reason to log in to your macOS machine, from a remote machine on your network, why not enable the SSH daemon.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Orleans to Boost Cyber Insurance to $10M Post-Ransomware πŸ•΄

Mayor LaToya Cantrell anticipates the recent cyberattack to exceed its current $3 million cyber insurance policy.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-6111

gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6094

cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system

πŸ“– Read

via "National Vulnerability Database".
❌ Greta Thunberg: Emotet’s Person of the Year ❌

The Swedish climate-change activist is the lure in a massive global malware campaign.

πŸ“– Read

via "Threatpost".
❌ Top Zero Days, Data Breaches and Security Stories of 2019: News Wrap ❌

From ransomware ramp up, to voice assistant privacy perils, the Threatpost team breaks down the top news stories from this past year.

πŸ“– Read

via "Threatpost".
πŸ” How to enable SSH login on macOS πŸ”

If you have a reason to log in to your macOS machine, from a remote machine on your network, why not enable the SSH daemon.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Research Team Demonstrates Perfect Secrecy Implementation πŸ•΄

The technique is notable because it can be implemented using low-cost, standard hardware components.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 12/20 Edition πŸ”

Ransomware hits New Orleans, a web hosting firm hit with a $10M GDPR fine, and a 15 million person breach - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".