πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ IoT Flaw Allows Hijacking of Connected Construction Cranes ❌

An attacker can send spoofed commands to the crane's controller.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ New Report: IoT Now Top Internet Attack Target πŸ•΄

IoT devices are the top targets of cyberattacks -- most of which originate on IoT devices, new report finds.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Implications of IBM-Red Hat Merger Unclear πŸ•΄

But enterprises and open source community likely have little to be concerned about, industry experts say.

πŸ“– Read

via "Dark Reading: ".
⚠ China hijacking internet traffic using BGP, claim researchers ⚠

Researchers claim that unusual BGP routing changes are actually man-in-the-middle surveillance.

πŸ“– Read

via "Naked Security".
πŸ” How cybersecurity is developing to combat Russian hackers πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses phishing and Russia's involvement in the 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” US rubber stamps right to repair: What it means for IT, SMBs, and tinkerers πŸ”

The previous copyright law that only allowed big manufacturers to fix tech products has finally been lifted. Here's what that means for techies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Illinois focuses on voter registration security for 2018 midterms in response to 2016 Russian breach πŸ”

Illinois had the only state voter registration database that Russian hackers successfully broke into in the 2016 election. Since then, it has spent millions on new cybersecurity protections.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How companies are amping up cybersecurity to prevent election meddling πŸ”

Theresa Payton, CEO at Fortalice Solutions, discusses cybersecurity, election meddling, and Russia's involvement in 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How companies are amping up cybersecurity to prevent election meddling πŸ”

Theresa Payton, CEO at Fortalice Solutions, discusses cybersecurity, election meddling, and Russia's involvement in 2016 US presidential election with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the FBI weighs cybersecurity risks against other criminal threats πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How the FBI weighs cybersecurity risks against other criminal threats πŸ”

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

πŸ“– Read

via "Security on TechRepublic".
⚠ Snakes in the grass! Malicious code slithers into Python PyPI repository ⚠

Not for the first time, typosquatting malware made its way into an open source code repository.

πŸ“– Read

via "Naked Security".
⚠ Gov worker visits 9k porn sites without protection, spreads infection ⚠

A now very β€œex”-government employee provides a teachable moment.

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1). Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q-dev (Affected 1.0.2-1.0.2p).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Steps for Creating Strong Customer Authentication πŸ•΄

Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help.

πŸ“– Read

via "Dark Reading: ".
⚠ Alleged SWATter will plead guilty to dozens of serious new federal charges ⚠

The long list of charges includes bank fraud, involuntary manslaughter, cyberstalking and wire fraud.

πŸ“– Read

via "Naked Security".
πŸ•΄ Girl Scouts Hacked, 2,800 Members Notified πŸ•΄

A Girl Scouts of America branch in California was hacked, putting the data of 2,800 girls and their families at risk.

πŸ“– Read

via "Dark Reading: ".
❌ ThreatList: Dead Web Apps Haunt 70 Percent of FT 500 Firms ❌

Abandoned web applications used by FT 500 Global Companies have exploitable flaws and weaknesses.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Google Updates reCAPTCHA: No More Boxes to Check ❌

Puzzles and check-boxes have been replaced with in-the-background behavioral analysis.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ The Case for MarDevSecOps πŸ•΄

Why security must lead the integration of marketing into the collaborative security and development model in the cloud.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why your data in the cloud isn't as secure as you think πŸ”

Nearly one-fourth of data in the cloud could put your organization at serious risk if it was leaked or stolen, according to a McAfee report.

πŸ“– Read

via "Security on TechRepublic".