πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Facial recognition is real-life β€˜Black Mirror’ stuff, Ocasio-Cortez says ⚠

"People think they're going to put on a cute filter and have puppy dog ears, and not realize that that data's being collected."

πŸ“– Read

via "Naked Security".
⚠ Google will now accept your iPhone as an authentication key ⚠

Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones.

πŸ“– Read

via "Naked Security".
⚠ Oracle’s January 2020 update patches 334 security flaws ⚠

The January 2020 update featured a joint record of 334 patches, matching an identical number released in July 2018.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 1/17 Edition πŸ”

As more troops are deployed to the Middle East, the U.S. military fears OPSEC failures, an app exposed the sensitive data of babies, and a site helping Australian bushfire victims becomes a victim itself - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to protect your organization and employees from conversation hijacking πŸ”

By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ ADP Users Hit with Phishing Scam Ahead of Tax Season πŸ•΄

Fraudulent emails tell recipients their W-2 forms are ready and prompt them to click malicious links.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 7 Ways to Get the Most Out of a Penetration Test πŸ•΄

You'll get the best results when you're clear on what you want to accomplish from a pen test.

πŸ“– Read

via "Dark Reading: ".
❌ FBI Plans to Inform States of Election Breaches ❌

The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.

πŸ“– Read

via "Threatpost".
πŸ•΄ Massive Oracle Patch Reverses Company's Trend Toward Fewer Flaws πŸ•΄

Following a year that saw the fewest number of vulnerabilities reported since 2015, Oracle's latest quarterly patch fixes nearly 200 new vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ FBI Seizes Domain That Sold Info Stolen in Data Breaches πŸ•΄

The website, WeLeakData.com, claimed to have more than 12 billion records gathered from over 10,000 breaches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Mobile Banking Malware Up 50% in First Half of 2019 πŸ•΄

A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019.

πŸ“– Read

via "Dark Reading: ".
⚠ 5 tips to avoid spear-phishing attacks ⚠

Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.

πŸ“– Read

via "Naked Security".
❌ News Wrap: PoC Exploits, Cable Haunt and Joker Malware ❌

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

πŸ“– Read

via "Threatpost".
πŸ” Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks πŸ”

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.

πŸ“– Read

via "Security on TechRepublic".
❌ Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? ❌

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

πŸ“– Read

via "Threatpost".
πŸ” Why baby boomers are looking to IoT and analytics to stay safe πŸ”

IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020.

πŸ“– Read

via "Security on TechRepublic".
❌ Mobile Carrier Customer Service Ushers in SIM-Swap Fraud ❌

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2007-6070

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1382. Reason: This candidate is a reservation duplicate of CVE-2008-1382. Notes: All CVE users should reference CVE-2008-1382 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
❌ Feds Cut Off Access to Billions of Breached Records with Site Takedown ❌

The WeLeakInfo "data breach notification" domain is no more.

πŸ“– Read

via "Threatpost".
❌ New JhoneRAT Malware Targets Middle East ❌

Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.

πŸ“– Read

via "Threatpost".
πŸ” This new startup aims to make developers love security πŸ”

Commentary: As more workloads move to the cloud, developers need help with security. Find out how the startup Cyral is helping to improve data security in the cloud.

πŸ“– Read

via "Security on TechRepublic".