-
Apple and Google Unveil Industry Specification For Unwanted Tracking
PRIVACY PRIVACY The new standard ensures that Bluetooth location-tracking can work with unauthorized tracking detection and alerts on iOS and Android Read More
-
Earth Longzhi Uses “Stack Rumbling” to Disable Security Software
PRIVACY PRIVACY Trend Micro analyzed two separate Earth Longzhi campaigns between 2020 and 2022 Read More
-
Vanta adds new SaaS capability to address growing concerns over vendor security
PRIVACY PRIVACY SaaS-based security and compliance solution provider Vanta has launched a Vendor Risk Management (VRM) offering to help organizations streamline third-party vendor security reviews and due diligence. The company claims that the new offering will automate vendor discovery, vendor assessment, and remediation workflows to significantly reduce the time and cost associated with third-party vendor…
-
Google rolls out passkey support across accounts on all major platforms
PRIVACY PRIVACY Google has begun rolling out support for passkeys across Google Accounts on all major platforms, adding a new sign-in option that can be used alongside passwords and two-step verification. The tech giant announced passkey availability on the eve of World Password Day as it looks to introduce more secure, reliable sign-in options. The…
-
How to Limit Location Tracking on Your Phone
PRIVACY PRIVACY We all know that our phones know a lot about us. And they most certainly know a lot about where we go, thanks to the several ways they can track our location. Location tracking on your phone offers plenty of benefits, such as with apps that can recommend a good restaurant nearby, serve…
-
Attacks increasingly use malicious HTML email attachments
PRIVACY PRIVACY Researchers warn that attackers are relying more on malicious HTML files in their attacks, with malicious files now accounting for half of all HTML attachments sent via email. This rate of malicious HTML prevalence is double compared to what it was last year and doesn’t appear to be the result of mass attack…
-
BlackCat group releases screenshots of stolen Western Digital data
PRIVACY PRIVACY Ransomware group BlackCat has released a set of screenshots on its leak site that it claims are from data stolen from Western Digital in an April system breach. The images include screenshots of videoconferences and internal emails of the storage device manufacturer, according to a tweet by cybersecurity researcher Dominic Alvieri. The screenshots…
-
Fortify your Mac with Intego – the award-winning Mac antivirus
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Intego. Thanks to the great team there for their support! Established in 1997, Intego is the leading company for Mac antivirus, providing powerful and reliable protection against malware, viruses, and other online threats. Intego offers a wide range of comprehensive security…
-
oneM2M IoT security specifications granted ITU approval
PRIVACY PRIVACY The ITU Telecommunication Standardization Sector (ITU-T) has approved a set of security specifications for internet of things (IoT) systems. The oneM2M specifications define a common set of IoT service functions to enable secure data exchange and information interoperability across different vertical sectors, service providers, and use cases. The specifications were approved by more…
-
SolarWinds Detected Six Months Earlier
PRIVACY PRIVACY New reporting from Wired reveals that the Department of Justice detected the SolarWinds attack six months before Mandient detected it in December 2020, but didn’t realize what they detected—and so ignored it. WIRED can now confirm that the operation was actually discovered by the DOJ six months earlier, in late May 2020but the…