News

  • What Types of Apps Track Your Location?

    PRIVACY PRIVACY Your mobile phone can do so many things, thanks to the wonders of technology. One of those things is having very accurate information about your location. In fact, some apps have to know your location to work.   Of course, you can’t expect Google Maps to function as it should without tracking your location.…

    Read More

  • Setting Up Parental Controls in TikTok, Instagram & Snapchat

    PRIVACY PRIVACY It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly hopping between so many different apps?” We get it, there’s a lot to stay on top and all of it changes constantly. Unfortunately, that question doesn’t have a simple answer. But there are…

    Read More

  • Friday Squid Blogging: Fishing for Squid

    PRIVACY PRIVACY Foreign Policy has a three-part (so far) podcast series on squid and global fishing. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • North Korean Hackers Target US Health Providers With ‘Maui’ Ransomware

    PRIVACY PRIVACY According to CISA, the threat actors have been engaging in these campaigns since May 2021 Read More

    Read More

  • Smart factories unprepared for cyberattacks

    PRIVACY PRIVACY Organizations operating smart factories largely agree that cybersecurity is a critical component to their operations. Many, however, are unprepared to deal with the growing number of cyberthreats against them, according to a report released last week by Capgemini, a provider of technology and digital transformation consulting services. The report, based on a survey…

    Read More

  • NIST Announces First Four Quantum-Resistant Cryptographic Algorithms

    PRIVACY PRIVACY NIST’s post-quantum computing cryptography standard process is entering its final phases. It announced the first four algorithms: For general encryption, used when we access secure websites, NIST has selected the CRYSTALS-Kyber algorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation.…

    Read More

  • APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh

    PRIVACY PRIVACY The weaponized Excel document would likely be distributed by means of a spear-phishing email Read More

    Read More

  • Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption

    PRIVACY PRIVACY Hive is not the first ransomware written in Rust, and follows in the footsteps of BlackCat Read More

    Read More

  • Comprehensive risk-based API protection with AppTrana

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! It is hard to imagine an application without APIs (Application Programming Interface). For the past few years, APIs have become core foundational for the success of businesses. Hence, there is no…

    Read More

  • AT&T Cybersecurity Insights Report: A Focus on SLED

    PRIVACY PRIVACY The public servants and educators that keep state and local governments and higher education institutions running stand at the nexus of change. They’re tasked with providing citizens with new services that account for rapid changes in the tech landscape and societal processes, while maintaining the same rock-solid dependability, security, and safety that people…

    Read More

News, Advisories and much more

Exit mobile version