Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 2

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the last article and this article will ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 1

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help.  Today ...

Continue Reading →
0

Guest Post – Don’t Let Your Phone Stalk You

The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones.  Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.

Stalkerware is not limited to Android phones. It can be installed ...

Continue Reading →
0

Anubis Banking Trojan Using Google Play and Telegram App

The powerful Anubis banking Trojan is showing up in the Google Play Store in other apps. Currently, Anubis is masquerading as a battery saver and currency converter.  This Android banking Trojan launches a fake app overlay screen when the user opens the app. The user enters his or her account credentials into the fake overlay, which allows the Anubis malware to steal the data. Anubis can imitate 377 financial apps used ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 2

A guest post by KC Karnes

Mobile App Security Exploit Examples: Painful Real-life Lessons

The climate around mobile app security is heating up.

Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.

In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.

Timehop Fails To Trust Two-Factor Authentication

Starting in December of 2017, TimeHop was ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Hacked tornado warning systems leave Texans in the dark

Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.


You left WHAT on that USB drive?!

Nudies, taxes, and memos – oh, my! Research shows that even if we think we’ve deleted content on the sticks, we’re leaving all ...

Continue Reading →
0

Guest Post – Cybercriminals Like Going Mobile Too

It’s something that we hear a lot about – mobile devices have become an integral part of our society. Can you remember the last time that you switched your phone off for the weekend? Can you even imagine not having your phone with you all the time? If you’re like most people, the idea is ludicrous. We keep everything on our phones.

It’s convenient for us – you don’t have to boot ...

Continue Reading →
0
Page 1 of 5 12345