Where Does Cell Phone Location Data Go?

Have you ever wondered what happens to the location information your smartphone is collecting about you?  Who has access to that information, and for what purpose?  As it turns out, as told in a recent report by Brian Krebs, this information is available to pretty much anybody.

A related article in Sophos’ Naked Security blog pointed to a Continue Reading →

0

Android Things Promises to Close IoT Security Holes

IoT or the Internet of Things has been to this point a seriously unsecured cluster-flop for the most part.  Millions of insecure devices are in our homes and businesses, and these devices may be eavesdropped, recording audio or video, performing a DDoS attack, or being leveraged as an easy access pivot point into your network for further exploitation

Thankfully, progress is being made ...

Continue Reading →
0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft Awareness Week

File early or an impostor may get your refund.  Especially now that the Equifax credit trove is in the wild.

01/29/2018 08:27 AM EST  Original release date: January 29, 2018

Tax Identity Theft Awareness Week is January ...

Continue Reading →
0

How Email Accounts Are Hijacked

The most devastating exploit that can happen to you is to have your email account hijacked.  We have spilled a lot of pixels on this subject (see below).  The reason we find this so dangerous is that it is that this is the attack most likely to happen to you.

Google recently released a study that analyzed how Gmail accounts are hijacked.  If you have an Android smartphone, you have a ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Google removed 60 games that contained code to display porn pop-ups and other malicious activities.  Click through to see list of bad apps.  If you installed any of them, you will need to remove these yourself.


Visa joins other major ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Over 75% of Android apps are secretly tracking users

Yale Privacy Lab has discovered hidden trackers in hundreds of popular Android apps that send app manufacturers your location, activity, and other personal info.


Cayla doll too eavesdroppy to put under the Christmas tree, says France

That Bluetooth Cayla doll and i-Que surveillance robot can be ...

Continue Reading →
0

Integrated Password Managers – Google Smart Lock

We are advocates of using a password manager to create, manage, and securely store the dozens (or hundreds) of unique and long passwords that we need to be using these days.  For many people, password managers can seem difficult to set up and a bit of a hassle to use.  The good news its that there are two easy and built-in alternatives, ...

Continue Reading →
0

Google Offers Advanced Protection Program for High Risk Individuals

If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.

Continue Reading →

0
Page 6 of 8 «...45678