Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent. As many as 88 percent of almost 21,000 mobile health (mHealth) applications that are accessible on the Google Play Store from Australia include code that can access and even share users’ personal data with third parties, … More Most health apps engage in unhealthy data‑harvesting habits
By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future. While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators, successful attacks are still making the headlines. It’s not just large operators in … More 5 essential things to do before ransomware strikes
The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information. Microsoft has shut down a sprawling Business Email Compromise (BEC) operation that had its infrastructure hosted in several web services. Using these cloud-based assets, the threat actors infiltrated hundreds of mailboxes across multiple organizations and … More Microsoft takes down large‑scale BEC operation
Looking to set off on the right foot with endpoint detection and response? Prioritize visibility into your systems. For organizations considering adoption of an endpoint detection and response (EDR) solution, MITRE Engenuity’s most recent ATT&CK® Evaluation provides a singular glimpse into how a prospective EDR tool stands in the face of sophisticated threats. The work of … More Endpoint detection and response: The path to security maturity starts with visibility
How do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business? We’ve all heard of phishing, the tried-and-tested email scam that spoofs authoritative sources to trick recipients into handing over sensitive information or downloading malware. Well, vishing is its voice call equivalent. It’s … More Vishing: What is it and how do I avoid getting scammed?