Apple is sneaking around its own privacy policy — and will regret it

Credit to Author: Evan Schuman| Date: Fri, 07 Jan 2022 03:04:00 -0800

Apple has a rather complicated relationship with privacy, which it always points to as a differentiator with Google. But delivering on it is a different tale. 

Much of this involves the definition of privacy. Fortunately for Apple’s marketing people, “privacy” is the ultimate undefinable term because every user views it differently. If you ask a 60-year-old man in Chicago what he considers to be private, you’ll get a very different answer than if you asked a 19-year-old woman in Los Angeles. Outside the US, privacy definitions vary even more. Germans and Canadians truly value privacy, but even they don’t agree on what they personally consider private.

To read this article in full, please click here

Read more

Microsoft Defender for Endpoint brings remote deployment to iOS

Credit to Author: Jonny Evans| Date: Thu, 06 Jan 2022 07:45:00 -0800

With the latest Microsoft Defender for Endpoint (MDE) preview for iOS, Microsoft has taken another step that should make life easier for IT administrators who need to secure remote iOS devices at the endpoint.

Endpoint protection without the user friction

The MDE preview includes a new capability to install Defender for Endpoint remotely and automatically on any devices enrolled in the service. The company first announced its intention to deliver the feature last month.

In practice, this seems relatively friction-free.

To read this article in full, please click here

Read more

7 smart steps to get your Android phone in tip-top shape for 2022

Credit to Author: JR Raphael| Date: Wed, 05 Jan 2022 03:00:00 -0800

Happy New Year! I don’t know about you, but I find the start of a fresh voyage around this shiny ol’ sun of ours to be a fine time for tidying up, optimizing, and getting good and organized for the months ahead. And while I’d love to pretend I’m the type of person who has one of those disgustingly pristine, clutter-free desks you see on the internet, let me be brutally honest: The physical space around me tends to resemble a half-abandoned hog parlor.

But my Android phone? My Android phone is as orderly as can be, gosh darn it. And if you ask me, that makes far more of a difference than the state of the physical space around me.

Our mobile devices are where we do so much of our actual work and contemplation these days, after all — and yet it’s all too easy to overlook the importance of maintaining an optimal arrangement for both productivity and security within ’em. So now, as we gaze ahead at the promise-filled 2022 calendar, join me in taking 10 minutes to get your own trusty Android phone fine-tuned and fully ready for the coming year.

To read this article in full, please click here

Read more

How to manually update Microsoft Defender

Credit to Author: Ed Tittel| Date: Tue, 04 Jan 2022 03:00:00 -0800

Microsoft Defender is the built-in anti-malware package that’s included with modern Windows operating systems. It’s alternatively known as Windows Security (it shows up under Settings as Windows Security) or Windows Defender (sometimes with Antivirus at the end of the name, as in this Microsoft Docs page). But whatever you want to call it, for many Windows users, this tool is the go-to default for handling security on their PCs.

To read this article in full, please click here

(Insider Story)

Read more

When biometrics can be outsmarted this way, we need to talk

Credit to Author: Evan Schuman| Date: Mon, 03 Jan 2022 06:43:00 -0800

It’s one of the sad facts of mobile authentication that the industry tends to initially support the least effective security options. Hence, phones initially supported authentication based on fingerprints (which can be impacted by prescriptions, cleaning products, hand injuries, and dozens of other factors) and then moved on to facial recognition. 

In theory, facial recognition is supposed to be more accurate. Mathematically, that’s fair, as it is examining far more data points than scanning a fingerprint. But the reality in the real world is much more problematic. It requires a precise distance from the phone and yet offers no pre-scan markers for the user to know when they hit it correctly. That’s one reason I see facial recognition reject a scan roughly 40% of the time — even though it will approve a positive scan two seconds later.

To read this article in full, please click here

Read more

Senate Committee passes new antitrust bill aimed at Big Tech companies

Credit to Author: Malwarebytes Labs| Date: Wed, 26 Jan 2022 17:14:15 +0000

A highly criticized new antitrust bill is on its way to the full Senate after a Senate committee approved it.

Categories: Security world

Tags:

(Read more…)

The post Senate Committee passes new antitrust bill aimed at Big Tech companies appeared first on Malwarebytes Labs.

Read more

This Week in Security News – December 17, 2021

Credit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000

This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.

Read more

Google sued over deceptive location tracking

Credit to Author: Malwarebytes Labs| Date: Wed, 26 Jan 2022 14:21:52 +0000

Google finds itself at the center of a privacy related lawsuit on location tracking.

Categories: Privacy

Tags:

(Read more…)

The post Google sued over deceptive location tracking appeared first on Malwarebytes Labs.

Read more

Volatile and Adaptable: Tracking the Movements of Modern Ransomware

Credit to Author: Trend Micro Research| Date: Wed, 15 Dec 2021 00:00:00 +0000

Trend Micro’s tracking of modern ransomware, as well as of older families, shows which attacks are gaining momentum and which families are particularly dangerous for enterprises and private users.

Read more