Google patches bug that let nearby hackers send malware to your phone

Credit to Author: Danny Bradbury| Date: Tue, 05 Nov 2019 14:42:47 +0000

Google has patched an Android bug that could have allowed attackers to use NFC to send over a malicious file to the victim’s phone<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/9svl-4gT4-I” height=”1″ width=”1″ alt=””/>

Read more

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

Credit to Author: Lucas Mearian| Date: Mon, 04 Nov 2019 03:00:00 -0800

While one in three large enterprises has a chief mobility officer (CMO), according to one survey, that role is now largely duplicative and unnecessary – and creating it can hit a company’s bottom line.

Management consultancy Janco Associates, which lists job descriptions and conducts bi-annual salary surveys, last week updated its description of a Chief Mobility Officer (CMO) to include privacy compliance policies in light of the California Consumer Privacy Act (CaCPA), which goes into effect in January.

“As the use of personal mobile devices, social networking, and compliance requirements expand, organizations are faced with a dilemma. How can they balance privacy compliance mandates like CaCPA with business continuity, security, and operational needs in an ever more complex operating environment?” said Victor Janulaitis, CEO of Janco Associates.

To read this article in full, please click here

Read more

WhatsApp sues spyware maker for allegedly hacking phones worldwide

Credit to Author: Lisa Vaas| Date: Thu, 31 Oct 2019 12:32:02 +0000

WhatsApp has publicly attributed the attack on its users in May 2019 to the Israeli spyware makers, NSO Group.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/rTg4uWB-Hmg” height=”1″ width=”1″ alt=””/>

Read more

Got an early iPhone or iPad? Update now or turn it into a paperweight

Credit to Author: John E Dunn| Date: Wed, 30 Oct 2019 12:26:25 +0000

Calling Apple iPhone 5, iPhone 4s or early iPad owners – your device may be about to turn into a vintage technology paperweight.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/zgT62q9uedk” height=”1″ width=”1″ alt=””/>

Read more

Gradient “celebrity matching” photo app sparks privacy fears

Credit to Author: Paul Ducklin| Date: Tue, 29 Oct 2019 11:53:02 +0000

The Kardashians love the Gradient app – but they’re being paid to use it, whereas for you it’s the other way round. Is it safe?<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/cKna-7UcJBE” height=”1″ width=”1″ alt=””/>

Read more

TikTok says no, senators, we’re not under China’s thumb

Credit to Author: Lisa Vaas| Date: Mon, 28 Oct 2019 13:20:57 +0000

US lawmakers asked intelligence to look into whether the app and others like it could pose a security threat or be used to influence opinion.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/GlESIs9AFxA” height=”1″ width=”1″ alt=””/>

Read more

5 big buts about the Pixel 4 phone

Credit to Author: JR Raphael| Date: Tue, 22 Oct 2019 04:00:00 -0700

Look, I’ll just come out and say it: I’m a big believer in buts.

Now, hang on a sec: You haven’t accidentally stumbled onto the world’s last remaining Sir Mix-a-Lot fan site. (If only!) No, the buts of which I speak at this particular moment are the single “t” variety — as in, the contradictory kinds of statements that are so frequently missing when we talk about technology.

You know what I’m talking about, right? Here in these tribal times of 2019, it’s all too easy to fall into a pattern of seeing a certain sort of product or type of device as being either “awesome” or “inferior,” with little gray space in between those extremes. You’ve used this kind of smartphone for years now, damn it, so it has to be the best! And that other company’s devices are, like, obviously awful. They’re from the competing team! They could never be worth your while.

To read this article in full, please click here

Read more

Don’t look now, but Pixel 4’s Face Unlock works with eyes closed

Credit to Author: John E Dunn| Date: Mon, 21 Oct 2019 11:47:32 +0000

There’s a risk that someone might get hold of a device and unlock it by holding the screen to the face of its sleeping or unconscious owner.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/AneJMxh1HJk” height=”1″ width=”1″ alt=””/>

Read more

Why we need Apple’s HomeKit-enabled routers

Credit to Author: Jonny Evans| Date: Wed, 16 Oct 2019 06:47:00 -0700

How secure are the connected smart devices you keep in your home? How much protection have you put in place, and have you even taken a minute to change your default router password?

Computer says no

The truth is many smart home device users (and those running connected devices in smart offices, enterprises, manufacturing and beyond) may not yet have taken stock of their security.

This is a particular problem when it comes to older smart devices, many of which are still in use even though a large number of them shipped with weak or non-replaceable factory default passcodes.

To read this article in full, please click here

Read more

Food writer Jack Monroe loses at least £5,000 in SIM-swap fraud

Credit to Author: Lisa Vaas| Date: Wed, 16 Oct 2019 10:53:52 +0000

Her accounts were drained in spite of using 2FA, showing that SIM swaps can still circumvent what’s a good security tool.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/QJiDHTqtHDo” height=”1″ width=”1″ alt=””/>

Read more