Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions you ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Mac users targeted by Lazarus ‘fileless’ Trojan

The Lazarus hacking group are trying to sneak a ‘fileless’ Trojan on to Apple computers, disguised as a fake cryptocurrency trading program.


[Heads-Up] In Just 3 Months, Google Alerted 12,000 People About Phishing Attacks by Nation-States

Google’s Threat Analysis Group (TAG) delivered thousands of alerts of government-backed ...

Continue Reading →
0

The Increasing Use of Mobile Spyware Apps

Never in human history has there been a platform for tracking, eavesdropping, reconnaissance, and surveillance like the smartphone.  With the right malware or phone store app, a marketing company, suspicious spouse, parent, nation-state cyber-spy, or your own government or law enforcement agency can easily spy on anyone carrying a smartphone.  Mobile devices often provide a bridge between a target’s personal life and professional ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Detecting Credit Card Skimmers

Modern credit card skimmers hidden in self-service gas pumps communicate via Bluetooth. There’s now an app that can detect them:

The team from the University of California San Diego, who worked with other computer scientists from the University of Illinois, developed an app called Bluetana which ...

Continue Reading →
0

Hack Turns iPhones and Android phones into Ultimate Surveillance Tool

If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone.  This includes real-time location information, all your emails and messaging (including encrypted versions such ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 2

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the last article and this article will ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 1

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help.  Today ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The Spycraft Revolution

An very cool. detailed, and facinating look at how technology is changing and breaking the spy game from foreignpolicy.com.  Worth the read.

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The winners will be those who break the old rules of the spy ...

Continue Reading →
0
Page 1 of 6 12345...»