January 15, 2020Security Fleeceware is back in Google Play – massive fees for not much at all The apps itself isn’t malicious – the treachery lies in the payment model. ——– Free High Security Email from Sigma
January 15, 2020Security ‘Cable Haunt’ vulnerability exposes 200 million cable modem users A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt – complete […]
January 15, 2020Security Google tests biometric authentication for Android autofill Google is testing out a feature to make Android’s built-in password manager safer. ——– Free High Security Email from Sigma
January 15, 2020Security Lottery hacker gets 9 months for his £5 cut of the loot We don’t care how little you made from your crimes, the judge said. We care that you went after an outfit that […]
January 15, 2020Security Microsoft now reviewing Skype audio in ‘secure’ places (not China) A former contractor in Beijing: “It sounds a bit crazy now […] that they gave me the URL, a username and password […]
January 15, 2020Security Microsoft Patches Windows Vuln Discovered by the NSA The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is […]
January 15, 2020Security Cloud Adoption & Technology Change Create Gaps in Enterprise Security Many companies are struggling to get a handle on risk exposure because of visibility issues, Radware survey shows. ——– Free High Security […]
January 15, 2020Security ‘Fancy Bear’ Targets Ukrainian Oil Firm Burisma in Phishing Attack The oil & gas company is at the heart of the ongoing US presidential impeachment case. ——– Free High Security Email from […]
January 15, 2020Security Google: Chrome Will Remove Third-Party Cookies and Tracking It’s “not about blocking” but removing them altogether, the company said. ——– Free High Security Email from Sigma
January 15, 2020Security Attackers Increasingly Focus on Business Disruption Network intruders are staying undetected for an average of 95 days, enabling them to target critical systems and more completely disrupt business. […]