iPhone attack may have targeted Android and Windows too

Credit to Author: John E Dunn| Date: Tue, 03 Sep 2019 14:47:23 +0000

A sophisticated and sustained watering hole attack affecting iPhones may have targeted Windows and Android too.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/3wCw5XE352c” height=”1″ width=”1″ alt=””/>

Read more

China’s new face-swapping app Zao gets whiplash-fast privacy backlash

Credit to Author: Lisa Vaas| Date: Tue, 03 Sep 2019 10:53:53 +0000

Fast trip: in two days, it debuted, shot to the top of China’s App Store, sparked privacy outrage, and got banned by WeChat.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Jf1X-mppWbo” height=”1″ width=”1″ alt=””/>

Read more

FBI asks Google for help finding criminals

Credit to Author: Danny Bradbury| Date: Tue, 03 Sep 2019 10:39:18 +0000

FBI agents issued Google with a warrant in November 2018, seeking its help with a bank robbery the month before.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/jfyUzpPb6Ww” height=”1″ width=”1″ alt=””/>

Read more

Google throws bug bounty bucks at mega-popular third-party apps

Credit to Author: Lisa Vaas| Date: Mon, 02 Sep 2019 10:51:32 +0000

Google&#8217;s going to throw more bug bounty money at the problem of nasty apps in its Play Store, it announced on Thursday. In a post from the Android Security &#38; Privacy team&#8217;s Adam Bacchus, Sebastian Porst, and Patrick Mutchler , the company said that it&#8217;s throwing the security net over not just its own apps, but [&#8230;]<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/bPMJRaBtj94″ height=”1″ width=”1″ alt=””/>

Read more

Botnet targets set-top boxes using Android OS

Credit to Author: John E Dunn| Date: Fri, 30 Aug 2019 12:07:32 +0000

Production systems aren’t supposed to have the ADB turned on, but some set-top boxes do.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YVYbkKJr18k” height=”1″ width=”1″ alt=””/>

Read more

Facebook: ‘Technical error’ let strangers into Messenger Kids chats

Credit to Author: Lisa Vaas| Date: Fri, 30 Aug 2019 11:58:00 +0000

It won’t happen again, Facebook told senators who wondered how well it’s handling kids’ privacy in the chat app abhorred by kids advocates.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/A2XiqyuYDg4″ height=”1″ width=”1″ alt=””/>

Read more

3 Google privacy tips for Mac and iOS users

Credit to Author: Jonny Evans| Date: Thu, 15 Aug 2019 04:15:00 -0700

Alternative search engines such as DuckDuckGo are attracting growing numbers of privacy focused users, but there’s no doubt that Google dominates the industry, even on Apple products. Fortunately, there are several ways to make your Google activity more private.

Do you have a Google account? (You probably do)

Do you use Gmail? Did you one use Google +? Perhaps you employ Google Drive, Google Docs or any of the company’s other products. If so, you have a Google account.

To read this article in full, please click here

Read more

Android users menaced by pre-installed malware

Credit to Author: John E Dunn| Date: Tue, 13 Aug 2019 09:16:09 +0000

Google Project Zero researcher Maddie Stone has found a new and concerning route for malware to find its way on to Android devices – malicious apps that have been factory pre-installed.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/vAwqo-IqEMU” height=”1″ width=”1″ alt=””/>

Read more

Apple will hand out unlocked iPhones to vetted researchers

Credit to Author: Lisa Vaas| Date: Mon, 12 Aug 2019 11:44:22 +0000

It formalizes the reality: “pre-jailbroken” iPhones were already on the black market.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/SFMBPoyjIsk” height=”1″ width=”1″ alt=””/>

Read more

Why blockchain-based voting could threaten democracy

Credit to Author: Lucas Mearian| Date: Mon, 12 Aug 2019 03:00:00 -0700

Public tests of blockchain-based mobile voting are growing.

Even as there’s been an uptick in pilot projects, security experts warn that blockchain-based mobile voting technology is innately insecure and potentially a danger to democracy through “wholesale fraud” or “manipulation tactics.”

The topic of election security has been in the spotlight recently after Congress held classified briefings on U.S. cyber infrastructure to identify and defend against threats to the election system, especially after Russian interference was uncovered in the 2016 Presidential election.

To read this article in full, please click here

Read more