-
What Types of Apps Track Your Location?
PRIVACY PRIVACY Your mobile phone can do so many things, thanks to the wonders of technology. One of those things is having very accurate information about your location. In fact, some apps have to know your location to work. Of course, you can’t expect Google Maps to function as it should without tracking your location.…
-
Setting Up Parental Controls in TikTok, Instagram & Snapchat
PRIVACY PRIVACY It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly hopping between so many different apps?” We get it, there’s a lot to stay on top and all of it changes constantly. Unfortunately, that question doesn’t have a simple answer. But there are…
-
Friday Squid Blogging: Fishing for Squid
PRIVACY PRIVACY Foreign Policy has a three-part (so far) podcast series on squid and global fishing. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
North Korean Hackers Target US Health Providers With ‘Maui’ Ransomware
PRIVACY PRIVACY According to CISA, the threat actors have been engaging in these campaigns since May 2021 Read More
-
Smart factories unprepared for cyberattacks
PRIVACY PRIVACY Organizations operating smart factories largely agree that cybersecurity is a critical component to their operations. Many, however, are unprepared to deal with the growing number of cyberthreats against them, according to a report released last week by Capgemini, a provider of technology and digital transformation consulting services. The report, based on a survey…
-
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
PRIVACY PRIVACY NIST’s post-quantum computing cryptography standard process is entering its final phases. It announced the first four algorithms: For general encryption, used when we access secure websites, NIST has selected the CRYSTALS-Kyber algorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation.…
-
APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh
PRIVACY PRIVACY The weaponized Excel document would likely be distributed by means of a spear-phishing email Read More
-
Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption
PRIVACY PRIVACY Hive is not the first ransomware written in Rust, and follows in the footsteps of BlackCat Read More
-
Comprehensive risk-based API protection with AppTrana
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! It is hard to imagine an application without APIs (Application Programming Interface). For the past few years, APIs have become core foundational for the success of businesses. Hence, there is no…
-
AT&T Cybersecurity Insights Report: A Focus on SLED
PRIVACY PRIVACY The public servants and educators that keep state and local governments and higher education institutions running stand at the nexus of change. They’re tasked with providing citizens with new services that account for rapid changes in the tech landscape and societal processes, while maintaining the same rock-solid dependability, security, and safety that people…