ICO concerned about privacy protection on WhatsApp/Facebook

An Information Commissioner’s Office (ICO) investigation into WhatsApp’s decision to share customer data with Facebook has confirmed initial concerns that personal information is not being properly handled. The UK’s information commissioner, Elizabeth Denham, said in an official company blog that consumers have been left in the dark about this development. “I had concerns that consumers … More ICO concerned about privacy protection on WhatsApp/Facebook

Tesco Bank not alone in being targeted by Retefe malware

For clarification, this article is focused on providing information on the increased activity of the Retefe banking trojan, which has been targeting various banks, mostly in Switzerland, Austria, and the UK. While this is happening at the same time as news breaking that Tesco Bank suffered a major cyberattack, there is no concrete evidence that … More Tesco Bank not alone in being targeted by Retefe malware

Secure your router: How to help prevent the next internet takedown

Who knows what evil lurks in the hearts of webcams? After the Dyn DDoS last month, this is a question on the minds of a lot of security people. Someone recently asked me if we shouldn’t adopt a new name for the Internet of Things (IoT) because the existing term is too vague. I responded … More Secure your router: How to help prevent the next internet takedown

I can see your texts: SMS/messaging clients, security, and privacy

My mother text me the other day about cycling and performance components. No one other than myself really wants to read that. Looking at the multitude of different types of SMS users out there, however, there is a very high probability that there is someone who wants to read or gain access to another user’s … More I can see your texts: SMS/messaging clients, security, and privacy

10 gadgets every white hat hacker needs in their toolkit

Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just a few measures, are being applied properly. That’s when, in order to continue the analysis from the perspective of a security researcher or consultant, social engineering and a … More 10 gadgets every white hat hacker needs in their toolkit