And most people don’t change their password even after hearing about a breach, a survey finds. While nearly all respondents in a recent survey were aware of the risks associated with poor password hygiene, most people don’t do anywhere near enough to keep attackers at bay, the third installment of the LastPass Psychology of Passwords Report has … More People know reusing passwords is risky – then do it anyway
Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers. Researchers have found a critical flaw that affects nearly all devices running Android 9.0 or older, which implies that over 90% of Android users could be vulnerable. If exploited, the security hole allows hackers to hijack … More Critical Android flaw lets attackers hijack almost any app, steal data
A hack-and-extort campaign takes aim at poorly secured databases replete with customer information that can be exploited for further attacks. A number of e-commerce websites from multiple continents have had their customer databases stolen, with an unknown seller offering at least 1.62 million rows of personal records for sale on a public website. The online … More Crooks threaten to leak customer data stolen from e‑commerce sites
ESET researchers discovered an extremely stealthy – yet surprisingly simple – technique that allowed Android malware to stay under the radar. Analyzing the DEFENSOR ID app that was – at the time – available on the official Android app store, ESET researchers learned the app misused Accessibility Services but required no other suspicious permission nor … More ESET researchers detect a new trick used by malware to slip into the official Android app store
Has the landmark law helped build a culture of privacy in organizations and have consumers become more wary of sharing their personal data? “Relying on the government to protect your privacy is like asking a peeping Tom to install your window blinds” – John Perry Barlow, EFF (July 1992). Any individual who has the slightest engagement in the … More Two years later, has GDPR fulfilled its promise?
In the rush to embrace IoT devices, we shouldn’t trade in our privacy and security for the added convenience. Ours is an interconnected world. We have smart doorbells, so we can check on our smartphones who rang, smartwatches to track our children’s’ locations, and fitness trackers to see how we are doing with our physical … More These things may be cool, but are they safe?