πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facebook will stop mining contacts with your 2FA number ⚠

Facebook clearly likes to use as much of your personal data as it feels it can, and that includes the phone number linked to your 2FA setting.

πŸ“– Read

via "Naked Security".
❀1
πŸ•΄ SIM Swapping Attacks: What They Are & How to Stop Them πŸ•΄

Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts

πŸ“– Read

via "Dark Reading: ".
⚠ Congress passes anti-robocall bill ⚠

A bill to punish robocallers has finished its passage through Congress and is expected to become law any day now.

πŸ“– Read

via "Naked Security".
⚠ Smartphone location data can be used to identify and track anyone ⚠

In today’s smartphone economy, hiding your location has become a major challenge.

πŸ“– Read

via "Naked Security".
❌ Podcast: What We’ve Learned from the Year of the Breach ❌

In this sponsored podcast, Threatpost sits down with Arctic Wolf's Matt Duench to discuss the lessons learned from this year's top data breaches.

πŸ“– Read

via "Threatpost".
❌ Top 10 IoT Disasters of 2019 ❌

From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.

πŸ“– Read

via "Threatpost".
πŸ” What is a Cloud Access Security Broker? πŸ”

What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ 20 Vulnerabilities to Prioritize Patching Before 2020 πŸ•΄

Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 2020 & Beyond: The Evolution of Cybersecurity πŸ•΄

As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Former NY Hospital Employee Admits to Stealing Colleagues' Data πŸ•΄

Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mastercard Announces Plan to Purchase RiskRecon πŸ•΄

The acquisition is expected to close in the first quarter of 2020.

πŸ“– Read

via "Dark Reading: ".
⚠ Serious Security: The decade-ending β€œY2K bug” that wasn’t ⚠

We explain why you really need to RTFM. Even if TFM is very long and complicated and you are very experienced.

πŸ“– Read

via "Naked Security".
❌ Twitter Fixes Bug that Enabled Takeover of Android App Accounts ❌

Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.

πŸ“– Read

via "Threatpost".
πŸ•΄ Citrix Urges Firms to Harden Configurations After Flaw Report πŸ•΄

A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Santa and the Zero-Trust Model: A Christmas Story πŸ•΄

How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.

πŸ“– Read

via "Dark Reading: ".
πŸ” 4 tips to help keep your APIs safe πŸ”

Security analysts say multifactor authentication is an absolute must for any company running multiple interfaces.

πŸ“– Read

via "Security on TechRepublic".
⚠ What a decade! Our baddest stories and biggest lessons, year by year… ⚠

From the bizarre, through the crazy, all the way to the outright impossible - there's still plenty to learn from all of these stories.

πŸ“– Read

via "Naked Security".
πŸ•΄ IoT Security: How Far We've Come, How Far We Have to Go πŸ•΄

As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
❌ The Case for Cyber-Risk Prospectuses ❌

Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.

πŸ“– Read

via "Threatpost".