Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

Credit to Author: Pieter Arntz| Date: Fri, 01 Nov 2019 20:26:48 +0000

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Categories:

Tags:

(Read more…)

The post Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press appeared first on Malwarebytes Labs.

Read more

Alexa and Google Home phishing apps demonstrated by researchers

Credit to Author: Lisa Vaas| Date: Wed, 23 Oct 2019 12:43:57 +0000

The researchers’ “Smart Spies” apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/2-76soYbixo” height=”1″ width=”1″ alt=””/>

Read more

Google chief warns visitors about smart speakers in his home

Credit to Author: Lisa Vaas| Date: Tue, 22 Oct 2019 09:37:52 +0000

Rick Osterloh says he discloses smart speaker use when someone enters his home, and the products should probably do so themselves.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/qRZbDKOCYpk” height=”1″ width=”1″ alt=””/>

Read more

Signal immediately fixed FaceTime-style eavesdropping bug

Credit to Author: Danny Bradbury| Date: Tue, 08 Oct 2019 11:25:17 +0000

Remember the FaceTime bug that allowed a caller to eavesdrop on your phone? Researchers just discovered another – this time in Signal.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/kuYuPSST8YI” height=”1″ width=”1″ alt=””/>

Read more

Facebook got humans to listen in on some Messenger voice chats

Credit to Author: Lisa Vaas| Date: Thu, 15 Aug 2019 10:15:55 +0000

Facebook says it’s paused the practice of collecting voice clips and sending them to employees to transcribe and analyze.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ygMZYoeBESk” height=”1″ width=”1″ alt=””/>

Read more

Everything you need to know about ATM attacks and fraud: part 2

Credit to Author: Jovi Umawing| Date: Fri, 02 Aug 2019 15:00:00 +0000

In part two of this two-part series on ATM attacks and fraud, we outline the final two ATM attack types—logical and social engineering—and provide info on how they are conducted, the different malware families used in these attacks, and how to protect against them.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: part 2 appeared first on Malwarebytes Labs.

Read more

Your Android’s accelerometer could be used to eavesdrop on your calls

Credit to Author: Danny Bradbury| Date: Tue, 23 Jul 2019 10:13:08 +0000

Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/XizfSFAizIQ” height=”1″ width=”1″ alt=””/>

Read more