πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google Account Security Keys Launch for iPhone ❌

iPhone users can now use Bluetooth to secure their Google accounts.

πŸ“– Read

via "Threatpost".
❌ Critical Cisco Flaws Now Have PoC Exploit ❌

The flaws affect a key tool for managing its network platform and switches.

πŸ“– Read

via "Threatpost".
πŸ•΄ New Attack Campaigns Suggest Emotet Threat Is Far From Over πŸ•΄

Malware described by the DHS as among the worst ever continues to evolve and grow, researchers from Cisco Talos, Cofense, and Check Point Software say.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses πŸ•΄

Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.

πŸ“– Read

via "Dark Reading: ".
⚠ EDRi’s guidelines call for more ethical websites ⚠

Recommendations cover areas including security and privacy while listing alternatives to free online services that slurp your users' data.

πŸ“– Read

via "Naked Security".
⚠ Facial recognition is real-life β€˜Black Mirror’ stuff, Ocasio-Cortez says ⚠

"People think they're going to put on a cute filter and have puppy dog ears, and not realize that that data's being collected."

πŸ“– Read

via "Naked Security".
⚠ Google will now accept your iPhone as an authentication key ⚠

Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones.

πŸ“– Read

via "Naked Security".
⚠ Oracle’s January 2020 update patches 334 security flaws ⚠

The January 2020 update featured a joint record of 334 patches, matching an identical number released in July 2018.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 1/17 Edition πŸ”

As more troops are deployed to the Middle East, the U.S. military fears OPSEC failures, an app exposed the sensitive data of babies, and a site helping Australian bushfire victims becomes a victim itself - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to protect your organization and employees from conversation hijacking πŸ”

By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ ADP Users Hit with Phishing Scam Ahead of Tax Season πŸ•΄

Fraudulent emails tell recipients their W-2 forms are ready and prompt them to click malicious links.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Ways to Get the Most Out of a Penetration Test πŸ•΄

You'll get the best results when you're clear on what you want to accomplish from a pen test.

πŸ“– Read

via "Dark Reading: ".
❌ FBI Plans to Inform States of Election Breaches ❌

The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.

πŸ“– Read

via "Threatpost".
πŸ•΄ Massive Oracle Patch Reverses Company's Trend Toward Fewer Flaws πŸ•΄

Following a year that saw the fewest number of vulnerabilities reported since 2015, Oracle's latest quarterly patch fixes nearly 200 new vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Seizes Domain That Sold Info Stolen in Data Breaches πŸ•΄

The website, WeLeakData.com, claimed to have more than 12 billion records gathered from over 10,000 breaches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mobile Banking Malware Up 50% in First Half of 2019 πŸ•΄

A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019.

πŸ“– Read

via "Dark Reading: ".
⚠ 5 tips to avoid spear-phishing attacks ⚠

Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.

πŸ“– Read

via "Naked Security".
❌ News Wrap: PoC Exploits, Cable Haunt and Joker Malware ❌

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

πŸ“– Read

via "Threatpost".
πŸ” Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks πŸ”

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? ❌

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

πŸ“– Read

via "Threatpost".
πŸ” Why baby boomers are looking to IoT and analytics to stay safe πŸ”

IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020.

πŸ“– Read

via "Security on TechRepublic".