🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
Gov worker visits 9k porn sites without protection, spreads infection

A now very “ex”-government employee provides a teachable moment.

📖 Read

via "Naked Security".
ATENTION New - CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1). Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q-dev (Affected 1.0.2-1.0.2p).

📖 Read

via "National Vulnerability Database".
🕴 10 Steps for Creating Strong Customer Authentication 🕴

Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help.

📖 Read

via "Dark Reading: ".
Alleged SWATter will plead guilty to dozens of serious new federal charges

The long list of charges includes bank fraud, involuntary manslaughter, cyberstalking and wire fraud.

📖 Read

via "Naked Security".
🕴 Girl Scouts Hacked, 2,800 Members Notified 🕴

A Girl Scouts of America branch in California was hacked, putting the data of 2,800 girls and their families at risk.

📖 Read

via "Dark Reading: ".
ThreatList: Dead Web Apps Haunt 70 Percent of FT 500 Firms

Abandoned web applications used by FT 500 Global Companies have exploitable flaws and weaknesses.

📖 Read

via "The first stop for security news | Threatpost ".
Google Updates reCAPTCHA: No More Boxes to Check

Puzzles and check-boxes have been replaced with in-the-background behavioral analysis.

📖 Read

via "The first stop for security news | Threatpost ".
🕴 The Case for MarDevSecOps 🕴

Why security must lead the integration of marketing into the collaborative security and development model in the cloud.

📖 Read

via "Dark Reading: ".
🔐 Why your data in the cloud isn't as secure as you think 🔐

Nearly one-fourth of data in the cloud could put your organization at serious risk if it was leaked or stolen, according to a McAfee report.

📖 Read

via "Security on TechRepublic".
🕴 Companies Fall Short on 2FA 🕴

New research ranks organizations based on whether they offer two-factor authentication.

📖 Read

via "Dark Reading: ".
🔐 How voter registration databases are vulnerable to nefarious actors 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

📖 Read

via "Security on TechRepublic".
🔐 How voter registration databases are vulnerable to nefarious actors 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, discusses the risks of data being changed or removed in voter registration databases and how voters can counter these actions.

📖 Read

via "Security on TechRepublic".
🔐 How database hacks could impact elections and voters' fears 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

📖 Read

via "Security on TechRepublic".
🔐 How database hacks could impact elections and voters' fears 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, explains SQL injection attacks and discusses how voter registration database hacks can lead to doubt in the election process.

📖 Read

via "Security on TechRepublic".
🔐 What we need to worry about with election hacking 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

📖 Read

via "Security on TechRepublic".
🔐 What we need to worry about with election hacking 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, says that voters need to put election hacking vulnerability risks into perspective.

📖 Read

via "Security on TechRepublic".
🔐 How to secure the US electoral system 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

📖 Read

via "Security on TechRepublic".
🔐 How to secure the US electoral system 🔐

Cris Thomas (aka Space Rogue), global strategy lead at IBM X-Force Red, details some of the steps that can be taken to shore up the American electoral system.

📖 Read

via "Security on TechRepublic".
🕴 Kraken Resurfaces From the Deep Web 🕴

Fallout Exploit Kit releases Kraken Cryptor ransomware, giving the simple threat a much larger target pool.

📖 Read

via "Dark Reading: ".
Square, PayPal POS Hardware Open to Multiple Attack Vectors

Popular card readers like Square and PayPal have various flaws that allow attacks ranging from fraud to card data theft.

📖 Read

via "The first stop for security news | Threatpost ".
🕴 Destructive Cyberattacks Spiked in Q3 🕴

Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds.

📖 Read

via "Dark Reading: ".