🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔐 How the FBI weighs cybersecurity risks against other criminal threats 🔐

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

📖 Read

via "Security on TechRepublic".
🔐 How the FBI weighs cybersecurity risks against other criminal threats 🔐

Leo Taddeo, chief information security officer at Cyxtera Technologies, discusses the continuous challenge of balancing incoming cyber threats with CNET's Dan Patterson.

📖 Read

via "Security on TechRepublic".
Snakes in the grass! Malicious code slithers into Python PyPI repository

Not for the first time, typosquatting malware made its way into an open source code repository.

📖 Read

via "Naked Security".
Gov worker visits 9k porn sites without protection, spreads infection

A now very “ex”-government employee provides a teachable moment.

📖 Read

via "Naked Security".
ATENTION New - CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1). Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q-dev (Affected 1.0.2-1.0.2p).

📖 Read

via "National Vulnerability Database".
🕴 10 Steps for Creating Strong Customer Authentication 🕴

Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help.

📖 Read

via "Dark Reading: ".
Alleged SWATter will plead guilty to dozens of serious new federal charges

The long list of charges includes bank fraud, involuntary manslaughter, cyberstalking and wire fraud.

📖 Read

via "Naked Security".
🕴 Girl Scouts Hacked, 2,800 Members Notified 🕴

A Girl Scouts of America branch in California was hacked, putting the data of 2,800 girls and their families at risk.

📖 Read

via "Dark Reading: ".
ThreatList: Dead Web Apps Haunt 70 Percent of FT 500 Firms

Abandoned web applications used by FT 500 Global Companies have exploitable flaws and weaknesses.

📖 Read

via "The first stop for security news | Threatpost ".
Google Updates reCAPTCHA: No More Boxes to Check

Puzzles and check-boxes have been replaced with in-the-background behavioral analysis.

📖 Read

via "The first stop for security news | Threatpost ".
🕴 The Case for MarDevSecOps 🕴

Why security must lead the integration of marketing into the collaborative security and development model in the cloud.

📖 Read

via "Dark Reading: ".
🔐 Why your data in the cloud isn't as secure as you think 🔐

Nearly one-fourth of data in the cloud could put your organization at serious risk if it was leaked or stolen, according to a McAfee report.

📖 Read

via "Security on TechRepublic".
🕴 Companies Fall Short on 2FA 🕴

New research ranks organizations based on whether they offer two-factor authentication.

📖 Read

via "Dark Reading: ".
🔐 How voter registration databases are vulnerable to nefarious actors 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

📖 Read

via "Security on TechRepublic".
🔐 How voter registration databases are vulnerable to nefarious actors 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

📖 Read

via "Security on TechRepublic".
🔐 How database hacks could impact elections and voters' fears 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

📖 Read

via "Security on TechRepublic".
🔐 How database hacks could impact elections and voters' fears 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

📖 Read

via "Security on TechRepublic".
🔐 What we need to worry about with election hacking 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

📖 Read

via "Security on TechRepublic".
🔐 What we need to worry about with election hacking 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

📖 Read

via "Security on TechRepublic".
🔐 How to secure the US electoral system 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

📖 Read

via "Security on TechRepublic".
🔐 How to secure the US electoral system 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

📖 Read

via "Security on TechRepublic".