When it works, Android’s app permissions are awesome. They’re straightforward and easy to understand. When you install a new app on your phone, you’ll get a popup box that gives you a summary of what permissions the app says it needs. Then, you have the option to either accept or …
New Phishing Scam Targets Your Amazon Account
McAfee researchers have discovered a new version of the 16Shop phishing kit in use by hackers around the world. According to the latest research, there are now more than 200 URLs currently being used by hackers to collect login information from Amazon customers. The methodology the hackers are using is …
Google Home Device Recordings May Not Be Private
Do you own a Google Home? If so, you probably find it to be indispensable. It’s a powerful, genuinely helpful piece of technology, but there’s a catch. It’s so good and so useful because it listens constantly for voice commands from you. Those commands get recorded. Recently, Google acknowledged that …
New Spyware Is Targeting WhatsApp Messages
Recently, Kaspersky Labs has identified a new strain of malware to be concerned about, and it is spreading across the internet. Called FinSpy, it specifically targets WhatsApp on both Android and iOS devices. An analysis of the code reveals that the spyware was created by a German company called Gamma …
Apple Turns Off Mac OS Feature For Security Concerns
Apple is in the news again, but not for anything good. Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer’s webcam without alerting the computer’s owner. The problem is a program called Zoom. The Zoom software installs a web …
Android Devices May Soon Get New Fast Sharing Feature
Google’s first attempt at making it possible for Android users to share files with each other was called Android Beam. While it was functional, it left a lot to be desired, and never really caught on. That fact prompted the company to announce that it would be calling a halt to …
Android Malware Can Replace Real Apps With Fake Apps
Security researchers at Check Point have discovered a disturbing new strain of Android malware that’s as ingenious as it is disturbing. It is effective because it is designed to replace a rapidly expanding number of apps with poisoned copies. The app copies still retain their core functionality, making the malware …
Unsecured Database May Have Exposed Some Big Companies
An UpGuard research team recently discovered several unsecured Amazon S3 buckets belonging to the Israeli IT Services firm Attunity. The company left the buckets unsecured, exposing more than a terabyte of sensitive information belong to a number of prominent companies including Ford, TD Bank and Netflix. To provide a sense …
SmartHome Device Vendor Data Leak Includes User Information
Orvibo is a Chinese manufacturer of smart home solutions. These are devices that allow owners to manage connected smart appliances in their home, remotely control lighting, security, HVAC and home entertainment devices, as well as monitor energy usage. Data from those operations are hosted on the company’s Smart Home cloud …
Protecting Utilities From Cyber Threats Is One Step Closer
The US government took another important step toward protecting the nation’s vulnerable electrical infrastructure with the passage of the SEIA bill in the Senate. The bill would mandate the use of analog or manual technologies on US power grids as a fallback in the event of a cyber-attack against the …