-
+33 +2Sinister secret backdoor found in networking gear perfect for government espionage: The Chinese are – oh no, wait, it's Cisco again
Right on cue, Cisco on Wednesday patched a security vulnerability in some of its network switches that can be exploited by miscreants to commandeer the IT equipment and spy on people. This comes immediately after panic this week over a hidden Telnet-based diagnostic interface was found in Huawei gateways. Although that vulnerability was real, irritating, and eventually removed at Vodafone's insistence, it was dubbed by some a hidden backdoor perfect for Chinese spies to exploit to snoop on Western targets.
-
+18 +5Huge US data leak from Microsoft cloud; 65% of households at risk
Yet another cloud database with no #security. And this one’s enormous. This time, Microsoft was discovered hosting an 80 million-row, open database of US adults aged over 40. We still don’t know who owns the data, but some speculate shadow IT is to blame. Obviously, Microsoft bears no responsibility whatsoever for this fantastic faux pas. The unprotected dataset is stuffed full of PII, and represents about 65% of US households. Let that sink in for a moment: sixty-five percent.
-
+12 +2Privacy 2019: Fixing a 16 year-old privacy problem in TLS with ESNI
In our previous post, we discussed Server Name Indication (SNI), an extension to SSL/TLS that dates back to 2003 and that has since become mandatory (TLS 1.3). So what problem does SNI actually solve and why is it necessary? SNI allows the server handling SSL/TLS termination to know which host you’re connecting to; this is important because the server needs to hand you a certificate with a Subject Name (SN)/SAN that is valid for the hostname being accessed.
-
+8 +1Avoid Surveillance With Helm, a Home Server Anyone Can Use to Keep Emails Truly Private
Helm is a well-thought-out product that’s as easy to set up as a smartphone. It’s $500 and $100 per year.
-
+9 +3Vodafone admits finding hidden security flaws in Huawei equipment
Vodafone discovered hidden security flaws in Huawei equipment a decade ago, it said on Tuesday, amid concerns over the Chinese company developing 5G networks in the UK. The telecoms company admitted that it found vulnerabilities in technology supplied to its Italian network, which have since been resolved, according to Bloomberg.
-
+29 +6Nearly all 2020 presidential candidates aren’t using a basic email security feature
Three years after Russian hackers targeted and breached the email accounts of Hillary Clinton’s presidential campaign, nearly all of the upcoming 2020 presidential candidates are still lagging in email security.
-
+19 +2Top 8 Best Bitcoin Security Tips
Today, with the assistance of Bitcoin, you’ll revolutionize the means you are doing your business. you’ll create payments with virtual currency anytime in an exceedingly matter of many seconds. And you will not need to pay something to associate mediator as there’ll be no card process concerned. You have your Bitcoins in your own Bitcoin notecase, which is able to form of your own bank. however there’s a catch. If you lose your notecase key, you’ll now not have access to your digital cash.
-
+15 +1The Most Commonly Hacked Passwords
Take the time to come up with a hard to break password or reap the consequences. Here are the most commonly hacked passwords...
-
+17 +1NSA Recommends Dropping Phone-Surveillance Program
The National Security Agency has recommended that the White House abandon a U.S. surveillance program that collects information about Americans’ phone calls and text messages, saying the logistical and legal burdens of keeping it outweigh its intelligence benefits.
-
+22 +5Invisible Malware Is Here and Your Security Software Can't Catch It
Sophisticated attackers are now using "invisible malware," a new form of attack that your firewalls can't stop and your anti-malware software can't find nor remove. Here are steps you can take right now to protect your servers and network.
-
+34 +6I tried to buy a coffee with McDonald’s mobile app, instead I was defrauded $2,000
Someone hacked my McDonald's mobile app and purchased roughly $2,000 worth of food at different locations across the country.
-
+11 +1As Europe builds its 5G network, security – not cost – must come first
On 26 March, the European commission published a recommendation designed to ensure the security of Europe’s 5G networks. You could be forgiven for having missed it, given that it was announced in what could hardly have been described as a “quiet EU news period”. However, the proposals are far-reaching and reflect the urgent need for coordinated action as we fast approach a technological tipping point of potentially profound significance.
-
+30 +7A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions
The larger lesson of an ongoing Ethereum crime spree: Be careful about who's generating your cryptocurrency keys.
-
+18 +1Teen hits Apple with $1B lawsuit over facial recognition arrest
An 18-year-old New Yorker filed a $1 billion lawsuit against Apple on Monday, claiming its facial recognition software incorrectly linked him to thefts at several stores. Ousmane Bah was arrested by NYPD officers on Nov. 29 after being blamed for thefts at Apple Stores in Boston, New Jersey, Delaware and Manhattan, according to his lawsuit.
-
+13 +75 ways to secure your containers
Container security has been ignored for too long. It's past time to start locking down containers. Here's how.
-
+18 +4Facebook's privacy mishaps: Zuckerberg could be held accountable, report says
Facebook CEO and co-founder Mark Zuckerberg may find himself in hot water with federal regulators. The Federal Trade Commission is looking into how to hold Zuckerberg accountable for Facebook's privacy mishaps, The Washington Post reported, citing two people familiar with the matter. That includes examining Zuckerberg's past remarks about privacy.
-
+16 +5Are you using the most-hacked password?
A list of all-too-predictable choices for breached accounts includes 123456 and "Liverpool".
-
+12 +1The Time Tim Cook Stood His Ground Against the FBI
The agency wanted a backdoor to crack the iPhone of Syed Farook, a suspect in the 2015 San Bernardino shooting. The Apple CEO said no.
-
+6 +1Cybersecurity Apps that will be Helpful in 2019
The usage of cybersecurity apps can help to protect your business by preventing a cyber attack, data breaches, and identity theft. Find out more about the best 2019 cybersecurity apps.
-
+9 +2Top 5 Myths of Cybersecurity: The Reality of Modern Threats
Nowadays there are plenty of myths about cybersecurity that need to be carefully examined. The article reveals and explains the most common myths regarding the cybersecurity.
Submit a link
Start a discussion




















