Those numbers or names that pop up when a call comes up? They're OK as a hint of who's calling, but THEY PROVE NOTHING
Read moreApple’s Device Analytics Can Identify iCloud Users
November 22 2022Researchers claim that supposedly anonymous device analytics information can identify users:
On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data...
Read more
How social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreHow social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreDon't let a keen eye for bargains lead you into risky online behaviour...
Read moreNSA Over-surveillance
November 11 2022Here in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read moreS3 Ep108: You hid THREE BILLION dollars in a popcorn tin?
November 11 2022Patches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!
Read moreIn all the excitement, we kind of lost track ourselves. Were there six 0-days, or only four?
Read moreUsing Wi-FI to See through Walls
November 8 2022This technique measures device response time to determine distance:
The scientists tested the exploit by modifying an off-the-shelf drone to create a flying scanning device, the Wi-Peep. The robotic...
Read more
Public URL scanning tools – when security leads to insecurity
November 8 2022Never make your users cry/By how you use an API
Read more
Recent Comments