πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How Can We Make Election Technology Secure? πŸ•΄

In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-2593

Cross-site scripting (XSS) vulnerability in the administrative interface in Atmail Webmail Server 6.4 allows remote attackers to inject arbitrary web script or HTML via the Date field of an email.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2010-3917

Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.

πŸ“– Read

via "National Vulnerability Database".
⚠ Update now – WhatsApp flaw gave attackers access to local files ⚠

The flaw affecting WhatsApp's desktop client when it's paired with the iPhone app allowed attackers access to local file systems.

πŸ“– Read

via "Naked Security".
πŸ•΄ RSAC Sets Finalists for Innovation Sandbox πŸ•΄

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.

πŸ“– Read

via "Dark Reading: ".
⚠ S2 Ep25: You’ve seen WHAT on public Trello boards? – Naked Security Podcast ⚠

New episode available now.

πŸ“– Read

via "Naked Security".
πŸ” Beware of malware disguised as Oscar-nominated movies including Joker and Parasite πŸ”

Joker was the hottest film among cybercriminals with 304 malicious files named after Batman's arch-nemesis, says security firm Kaspersky.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Invisible Pixel Patterns Can Communicate Data Covertly πŸ•΄

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.

πŸ“– Read

via "Dark Reading: ".
πŸ” Why shortcuts lead to failure: Lessons from app disaster in Iowa πŸ”

Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ A Matter of Trust πŸ•΄

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.

πŸ“– Read

via "Dark Reading: ".
❌ U.S. Finance Sector Hit with Targeted Backdoor Campaign ❌

The powerful Minebridge backdoor gives cyberattackers full run of a victim's machine.

πŸ“– Read

via "Threatpost".
❌ Metamorfo Returns with Keylogger Trick to Target Financial Firms ❌

The malware uses a tactic to force victims to retype passwords into their systems - which it tracks via a keylogger.

πŸ“– Read

via "Threatpost".
πŸ•΄ Facebook Tops Imitated Brands as Attackers Target Tech πŸ•΄

Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.

πŸ“– Read

via "Dark Reading: ".
πŸ” The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app πŸ”

Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras πŸ•΄

Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Forescout Acquired by Private Equity Team πŸ•΄

The deal, valued at $1.9 billion, is expected to close next quarter.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-6340

An Authentication vulnerability exists in NETGEAR WGR614 v7 and v9 due to a hardcoded credential used for serial programming, a related issue to CVE-2006-1002.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6309

A vulnerability exists in Arctic Torrent 1.4 via unspecified vectors in .torrent file handling, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6307

A vulnerability exists in JPEGsnoop 1.5.2 due to an unspecified issue in JPEG file handling, which could let a malicious user execute arbitrary code

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6306

A vulnerability exists in HCView (aka Hardcoreview) 1.4 due to a write access violation with a GIF file.

πŸ“– Read

via "National Vulnerability Database".