πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Ambiguity Around CCPA Will Lead to a Slow Start in 2020 πŸ•΄

But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5639

LibreOffice and OpenOffice automatically open embedded content

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-3409

ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Someone's Been Very Naughty ... πŸ•΄

Cybercriminals expose Santa's naughty list -- names and reasons -- on the Internet. "Ho, ho, ho! God, what a mess!" exclaims a source who requested anonymity.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Should I Have a Security Travel Policy to Protect Devices and Sensitive Data? πŸ•΄

Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.

πŸ“– Read

via "Dark Reading: ".
❌ Wawa Data Breach: Malware Stole Customer Payment Card Info ❌

Wawa said that payment-processing system malware had potentially affected all 850 of its locations.

πŸ“– Read

via "Threatpost".
❌ It’s Time for Your SOC to Level Up ❌

Artificial intelligence can provide manpower, context and risk assessment.

πŸ“– Read

via "Threatpost".
πŸ•΄ 6 Traits to Develop for Cybersecurity Success πŸ•΄

Cultivate these half-dozen qualities and watch your career soar.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable SSH login on macOS πŸ”

If you have a reason to log in to your macOS machine, from a remote machine on your network, why not enable the SSH daemon.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ New Orleans to Boost Cyber Insurance to $10M Post-Ransomware πŸ•΄

Mayor LaToya Cantrell anticipates the recent cyberattack to exceed its current $3 million cyber insurance policy.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-6111

gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6094

cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system

πŸ“– Read

via "National Vulnerability Database".
❌ Greta Thunberg: Emotet’s Person of the Year ❌

The Swedish climate-change activist is the lure in a massive global malware campaign.

πŸ“– Read

via "Threatpost".
❌ Top Zero Days, Data Breaches and Security Stories of 2019: News Wrap ❌

From ransomware ramp up, to voice assistant privacy perils, the Threatpost team breaks down the top news stories from this past year.

πŸ“– Read

via "Threatpost".
πŸ” How to enable SSH login on macOS πŸ”

If you have a reason to log in to your macOS machine, from a remote machine on your network, why not enable the SSH daemon.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Research Team Demonstrates Perfect Secrecy Implementation πŸ•΄

The technique is notable because it can be implemented using low-cost, standard hardware components.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 12/20 Edition πŸ”

Ransomware hits New Orleans, a web hosting firm hit with a $10M GDPR fine, and a 15 million person breach - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Cloud computing in 2020: Predictions about security, AI, Kubernetes, more πŸ”

Find out what Jack Wallen predicts for the cloud and cloud-adjacent technology in 2020 and why he encourages you to dream big.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ F5 Pays $1 Billion for Shape πŸ•΄

The acquisition adds fraud detection and prevention to the application delivery company's tool collection.

πŸ“– Read

via "Dark Reading: ".
πŸ›  Stegano 0.9.8 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
⚠ Man jailed for $122 million scam that fooled Google and Facebook ⚠

Lithuanian Evaldas Rimasauskas has been sentenced to five years in jail for successfully defrauding two US companies out of $122 million.

πŸ“– Read

via "Naked Security".