πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2013-4763

Samsung Galaxy S3/S4 exposes an unprotected component allowing arbitrary SMS text messages without requesting permission.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4743

Static HTTP Server 1.0 has a Local Overflow

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4692

Xorbin Analog Flash Clock 1.0 extension for Joomia has XSS

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-4621

Magnolia CMS before 4.5.9 has multiple access bypass vulnerabilities

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2007-0158

thttpd 2007 has buffer underflow.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-4980

Multiple stack-based buffer overflows in CFProfile.exe in Toshiba ConfigFree Utility 8.0.38 allow user-assisted attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
⚠ 7 types of virus – a short glossary of contemporary cyberbadness ⚠

Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaustive list... but it's a helpful start.

πŸ“– Read

via "Naked Security".
πŸ” How to change the HTTP listening port in Apache πŸ”

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 6 CISO New Year's Resolutions for 2020 πŸ•΄

We asked chief information security officers how they plan to get their infosec departments in shape next year.

πŸ“– Read

via "Dark Reading: ".
⚠ Monday review – the hot 12 stories of the week ⚠

From smartphone tracking to "climate change" malware, get up to date with everything we've written in the last week.

πŸ“– Read

via "Naked Security".
πŸ” How to change the HTTP listening port in Apache πŸ”

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

πŸ“– Read

via "Security on TechRepublic".
❌ Top Mobile Security Stories of 2019 ❌

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.

πŸ“– Read

via "Threatpost".
❌ Mean Time to Hardening: The Next-Gen Security Metric ❌

Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.

πŸ“– Read

via "Threatpost".
πŸ•΄ Fraud in the New Decade πŸ•΄

Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ How Can My Security Team Begin Future-Proofing for Quantum Computing? πŸ•΄

Knowing where your digital certificates are is just the start.

πŸ“– Read

via "Dark Reading: ".
❌ IoT Company Wyze Leaks Emails, Device Data of 2.4M ❌

The Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.

πŸ“– Read

via "Threatpost".
⚠ Celebrity addresses posted online in New Year’s Honours List leak ⚠

Too much information.

πŸ“– Read

via "Naked Security".
πŸ” How to choose the best MDM partner: 5 key considerations πŸ”

Here's what organizations considering using a mobile device management server should keep in mind.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How AI and Cybersecurity Will Intersect in 2020 πŸ•΄

Understanding the new risks and threats posed by increased use of artificial intelligence.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-5645

A denial of service flaw was found in the way the server component of Freeciv before 2.3.4 processed certain packets. A remote attacker could send a specially-crafted packet that, when processed would lead to memory exhaustion or excessive CPU consumption.

πŸ“– Read

via "National Vulnerability Database".