πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app πŸ”

Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras πŸ•΄

Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Forescout Acquired by Private Equity Team πŸ•΄

The deal, valued at $1.9 billion, is expected to close next quarter.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2012-6340

An Authentication vulnerability exists in NETGEAR WGR614 v7 and v9 due to a hardcoded credential used for serial programming, a related issue to CVE-2006-1002.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6309

A vulnerability exists in Arctic Torrent 1.4 via unspecified vectors in .torrent file handling, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6307

A vulnerability exists in JPEGsnoop 1.5.2 due to an unspecified issue in JPEG file handling, which could let a malicious user execute arbitrary code

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6306

A vulnerability exists in HCView (aka Hardcoreview) 1.4 due to a write access violation with a GIF file.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6297

Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Phishing Personified πŸ•΄

What makes these scams so completely obvious in the physical form?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 90% of CISOs Would Cut Pay for Better Work-Life Balance πŸ•΄

Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack πŸ•΄

New exploit builds on previous research involving Philips Hue Smart Bulbs.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to use 7zip to encrypt files πŸ”

If you need strong command line encryption on Linux, look no further than 7zip.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Irish Data Protection Puts Google on Notice for Data Privacy - Again πŸ”

Ireland's Data Protection Commission has announced that it's looking into Google yet again - this time for the way it processes user location data and transparency.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Magecart Gang Attacks Olympic Ticket Reseller and Survival Food Sites ❌

A recent slew of skimming attacks have been linked back to Magecart Group 12.

πŸ“– Read

via "Threatpost".
⚠ Cybercrooks busted for multimillion-dollar identity fraud ⚠

Organizations were attacked for employees' data, including names, addresses and birthdates used to set up hundreds of bank accounts.

πŸ“– Read

via "Naked Security".
⚠ Wacom driver caught monitoring third-party software use ⚠

Graphics tablet company Wacom can collect data unconnected to its products, such as which applications users open on their computers.

πŸ“– Read

via "Naked Security".
⚠ Facebook, Google, YouTube order Clearview to stop scraping faceprints ⚠

It's my First Amendment right to scrape publicly available face images, its CEO says. Besides, we're just doing what Google Search does.

πŸ“– Read

via "Naked Security".
⚠ Researchers transmit data covertly by altering screen brightness ⚠

Researchers have retrieved data from a disconnected computer by altering its LCD's pixel density just enough for a camera to pick it up.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five: 2/7 Edition πŸ”

Ransomware takes a dangerous turn, a flaw in the Android Twitter app is exploited, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Phishing Campaign Targets 250 Android Apps with Anubis Malware ❌

New attacks discovered by Cofense can perform keylogging, steal data and completely hijack a mobile device.

πŸ“– Read

via "Threatpost".
πŸ•΄ 5 Measures to Harden Election Technology πŸ•΄

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

πŸ“– Read

via "Dark Reading: ".