Android pulls 24 ‘dangerous’ malware-filled apps from Play Store

Credit to Author: Lisa Vaas| Date: Thu, 06 Feb 2020 11:35:36 +0000

The malware-infected apps used to harvest data and sign users up to premium services have been downloaded more than 382 million times.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/8tR9brfQrYs” height=”1″ width=”1″ alt=””/>

Read more

Someone else may have your videos, Google tells users

Credit to Author: John E Dunn| Date: Wed, 05 Feb 2020 11:58:47 +0000

As the well-worn internet saying goes – there is no cloud, it’s just someone else’s computer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ANgXswF_DM0″ height=”1″ width=”1″ alt=””/>

Read more

Critical Android flaws patched in February bulletin

Credit to Author: Danny Bradbury| Date: Wed, 05 Feb 2020 11:46:14 +0000

Google has patched Android bugs that include a couple of critical flaws that could let hackers run their own code on the mobile operating system.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/k2wIz5MF-3I” height=”1″ width=”1″ alt=””/>

Read more

Twitter admits to raid on users’ phone numbers

Credit to Author: John E Dunn| Date: Wed, 05 Feb 2020 11:20:13 +0000

It relates to Twitter’s contact upload feature, which allows users to find others via contact info such as email or phone number.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/JjUJFBQ-IaQ” height=”1″ width=”1″ alt=””/>

Read more

NIST tests methods of recovering data from smashed smartphones

Credit to Author: John E Dunn| Date: Tue, 04 Feb 2020 12:54:30 +0000

Criminals have found to their cost that reducing a device to a pile of rubble means nothing if the internal chips are still in working order.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/DhhD2UVxfZU” height=”1″ width=”1″ alt=””/>

Read more

Apple proposes simple security upgrade for SMS 2FA codes

Credit to Author: John E Dunn| Date: Mon, 03 Feb 2020 12:54:31 +0000

Apple thinks it’s come up with a simple way to make SMS two-factor authentication (2FA) one-time codes less susceptible to phishing attacks.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/EmuD8lIFjiU” height=”1″ width=”1″ alt=””/>

Read more

FTC warns VoIP providers that help robocallers: we can and will sue

Credit to Author: Lisa Vaas| Date: Mon, 03 Feb 2020 12:21:32 +0000

It put 19 internet-calling companies on notice that helping illegal robocalls is illegal. It has sued before, and it can do it again.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/WgDkr2jGNg4″ height=”1″ width=”1″ alt=””/>

Read more

UN hacked via unpatched SharePoint server

Credit to Author: Danny Bradbury| Date: Fri, 31 Jan 2020 13:04:44 +0000

UN staffers: the “entire domain” was probably compromised by an attacker who was lurking on the UN’s networks.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/RonIAIVbyIQ” height=”1″ width=”1″ alt=””/>

Read more

Financial tech firms disagree on ban of customer data screen-scraping

Credit to Author: Lisa Vaas| Date: Fri, 31 Jan 2020 12:05:49 +0000

They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they can’t afford to build APIs instead.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/p33_Z7ZunMU” height=”1″ width=”1″ alt=””/>

Read more