Alerts, Android, Breach, Business Continuity, Compliance, Hacks, Legal, Microsoft, News Bites, Privacy, Safety, Security Practices
AT&T is First Company To Evade SEC’s 4 Day Breach Disclosure No, they are not badasses, they asked for permission. The SEC rules that went into effect last year have a carve out from the disclosure rule – actually it is not an exception, just a delay. It is not clear who asked whom, but […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Android Trojan Hits 140 Countries, 10,000 Victims Via Social Media Hijack Security company Zimperium says they have found a new trojan they call Flytrap that has been around since March and compromises users’ phones who side load apps from third party app stores. Once the malicious app is on the user’s phone, it uses that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Donald Trump has signed an executive order banning the use of eight Chinese apps, namely Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office. The EO says that the apps can track users and capture personal data – Just like, say, Facebook or Fox News or any other American app. But […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I tend to be a bit of a dog on a bone when it comes to patching your phone. Apple helps its phone owners and usually shoves patches down your throat, whether you want them or not – as long as the phone is still supported. But when it comes to Android phones, it is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
All smartphones are data collection machines; hopefully everyone understands that. There are an amazing number of sensors on the device and many apps just ask for everything. If the user grants that, then the app can harvest all that data and likely sell it, either individually or in the aggregate. Researchers took a tiny sample […]
Continue reading →
[DISPLAY_ACURAX_ICONS]