Guest Post – Mac Threats Are On The Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

For the first time, cyberthreats targeting Mac devices have outpaced those targeting Windows machines. In 2018, there was an average of 4.8 threats detected per Mac endpoint. In ...

Continue Reading →
0

With “Friends” Like The Saudis, Who Needs Enemies?

Or The Strange Case of Jeff Bezos’ IPhone and the Saudi Crown Prince

The evidence says that the Saudi Arabian Crown Prince, Mohammed bin Salman (aka MBS) engineered a way to hack Jeff Bezos’ cell phone.  Just why MBS would be interested in Jeff, Jeff’s phone, or Jeff’s life is an interesting question, with surprising answers.

It seems that MBS invited Jeff Bezos to a private party, and during the course of ...

Continue Reading →
0

The Increasing Use of Mobile Spyware Apps

Never in human history has there been a platform for tracking, eavesdropping, reconnaissance, and surveillance like the smartphone.  With the right malware or phone store app, a marketing company, suspicious spouse, parent, nation-state cyber-spy, or your own government or law enforcement agency can easily spy on anyone carrying a smartphone.  Mobile devices often provide a bridge between a target’s personal life and ...

Continue Reading →
0

Hack Turns iPhones and Android phones into Ultimate Surveillance Tool

If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone.  This includes real-time location information, all your emails and messaging (including encrypted versions ...

Continue Reading →
0

Guest Post – Don’t Let Your Phone Stalk You

The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones.  Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.

Stalkerware is not limited to Android phones. It can be ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cyber war meets real war.

Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First

And from Bruce Schneier and Wired.


Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Russia accused of massive GPS spoofing campaign

Russia has been hijacking signals sent by Global Navigation Satellite Systems (GNSS) systems such as GPS, researchers claim.


Spycam sex videos of 1,600 motel guests sold to paying subscribers

1,600 guests were filmed with hidden webcams that live-streamed the action. The site also sold videos.


Continue Reading →
0

Personal and Business Uses for Keyloggers.

Would you like to use a keylogger to spy on your spouse?  How about your kids?  Is it legal?  Can an employer use a keylogger to monitor employee computer activity in the workplace?

Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer.  Today we are looking at this from another angle.

A keylogger, if you don’t know, ...

Continue Reading →
0
Page 1 of 4 1234