Bring your own privacy: VPNs for consumers and orgs

Credit to Author: Malwarebytes Labs| Date: Fri, 06 Mar 2020 17:24:33 +0000

VPNs are all the rage, but they’re not without their problems. Where do you stand on the great “Should we deploy a VPN” debate?

Categories:

Tags:

(Read more…)

The post Bring your own privacy: VPNs for consumers and orgs appeared first on Malwarebytes Labs.

Read more

GoodRx stops sharing personal medical data with Google, Facebook

Credit to Author: Lisa Vaas| Date: Tue, 03 Mar 2020 12:47:27 +0000

The mobile app saves people money but was letting 20 companies know who’s taking antipsychotics, erectile dysfunction and HIV meds, and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Mjy_qyNwWEk” height=”1″ width=”1″ alt=””/>

Read more

Verizon: Companies will sacrifice mobile security for profitability, convenience

Credit to Author: Lucas Mearian| Date: Tue, 03 Mar 2020 03:00:00 -0800

Despite an increase in the number of companies hit by mobile attacks that led to compromises, four in 10 businesses sacrificed security to meet profit goals or avoid “cumbersome” security processes, according to Verizon’s third annual Mobile Security Index 2020.

It showed that 43% of organizations sacrificed security. More typical reasons for companies exposing themselves to risk, such as lack of budget and IT expertise, trailed “way behind” things such as expediency (62%), convenience (52%) and  profitability targets (46%). Lack of budget and IT expertise were only cited by 27% and 26% of respondents, respectively.

To read this article in full, please click here

Read more

Will pay by palm be a thing? Should it be?

Credit to Author: Evan Schuman| Date: Tue, 03 Mar 2020 03:00:00 -0800

Amazon is experimenting with a way to allow shoppers to use a palm-print biometric to authenticate payments and to do so in physical stores far beyond Amazon-owned brick-and-mortars, (Whole Foods, AmazonGo, AmazonBooks, Amazon 4-Star and Amazon Pop-Up). Amazon is reportedly looking at QSRs (quick-service restaurants), especially coffee shops.

Palm prints have several advantages over more popular mobile biometric methods, such as fingerprint (prescription drugs, cleaning chemicals, burns and various other things can interfere with fingerprint readings) and facial recognition (finicky method that requires the face to be a precise distance from the scanner — not an inch too close or too far — and can suffer from hair growth, lighting, cosmetic changes, some sunglasses, as well as giving false positives to close relatives). And unlike my favorite biometric for security (retina scan), it’s far less invasive. It’s fairly accurate, convenient and (other than forcing customers to remove gloves, which could be a problem with outdoor shops in the winter) should be well-received.

To read this article in full, please click here

Read more

Facebook sues data analytics firm OneAudience over malicious SDK

Credit to Author: Lisa Vaas| Date: Mon, 02 Mar 2020 11:52:59 +0000

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/cTLgFQQq3iM” height=”1″ width=”1″ alt=””/>

Read more

How and why you need HomeKit-secured smart homes

Credit to Author: Jonny Evans| Date: Thu, 27 Feb 2020 04:40:00 -0800

Once upon a time the Internet was amazing, enabling niche interests and connecting people. Apple’s iMac was the epitome of the era, while the iPhone became the prophet of change.

What is HomeKit-secured and why should you use it?

These days hackers break into home networks using our routers and smart home devices, which is why everyone must learn how to use HomeKit-secured routers to keep their connected homes safe.

Apple announced HomeKit-secured routers at WWDC 2019. The first few devices to support the tech recently began to reach market, including options from Linksys and (now) Amazon’s Eero routers.

To read this article in full, please click here

Read more

LTE vulnerability allows impersonation of other mobile devices

Credit to Author: Danny Bradbury| Date: Wed, 26 Feb 2020 16:27:45 +0000

Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/FZepiqGAIX0″ height=”1″ width=”1″ alt=””/>

Read more

Switch to Signal for encrypted messaging, EC tells staff

Credit to Author: Lisa Vaas| Date: Wed, 26 Feb 2020 11:31:35 +0000

Formerly preferred diplomatic app WhatsApp apparently isn’t up to snuff.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/mRJrv_YSfXw” height=”1″ width=”1″ alt=””/>

Read more

Android 11 to clamp down on background location access

Credit to Author: John E Dunn| Date: Tue, 25 Feb 2020 17:51:53 +0000

Is Android finally about to get on top of the issue of apps that quietly suck up location data?<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/pgha-yLJwm8″ height=”1″ width=”1″ alt=””/>

Read more

Google purges 600 Android apps for “disruptive” pop-up ads

Credit to Author: Lisa Vaas| Date: Mon, 24 Feb 2020 12:26:22 +0000

These apps plunk ads in front of us when we’re trying to do something else, often leading to inadvertent ad clicks and much cursing.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/xlWz9s2MFTA” height=”1″ width=”1″ alt=””/>

Read more