Apple’s scanning iCloud photos for child abuse images

Credit to Author: Lisa Vaas| Date: Thu, 09 Jan 2020 12:22:36 +0000

It isn’t new, all the tech giants do it, and your privacy’s intact – unless you’re dealing in illegal imagery with telltale hashing.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Z3fh0bRjivU” height=”1″ width=”1″ alt=””/>

Read more

Google voice Assistant gets new privacy ‘undo’ commands

Credit to Author: John E Dunn| Date: Thu, 09 Jan 2020 12:02:58 +0000

Google’s controversial voice Assistant is getting a series of new commands designed to work like privacy-centric ‘undo’ buttons.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/suVe_eSbeHg” height=”1″ width=”1″ alt=””/>

Read more

FBI asks Apple to help it unlock iPhones of naval base shooter

Credit to Author: Lisa Vaas| Date: Thu, 09 Jan 2020 11:41:31 +0000

This could signal a renewed war between Apple and law enforcement over breaking encryption.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/TYQ-v0iT5FM” height=”1″ width=”1″ alt=””/>

Read more

Google’s Project Zero highlights patch quality with policy tweak

Credit to Author: Danny Bradbury| Date: Thu, 09 Jan 2020 11:26:07 +0000

Google’s Project Zero bug-hunting team has tweaked its 90-day responsible disclosure policy to help improve the quality and adoption of vendor patches.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/45XsE2-NHPY” height=”1″ width=”1″ alt=””/>

Read more

Apple wants privacy laws to protect its users

Credit to Author: Jonny Evans| Date: Wed, 08 Jan 2020 06:54:00 -0800

Your iPhone (like most smartphones) knows when it is picked up, what you do with it, who you call, where you go, who you know – and a bunch more personal information, too.

The snag with your device knowing all this information is that once the data is understood, that information can be shared or even used against you.

Information is power

Jane Horvath, Apple’s senior director for global privacy, appeared at CES 2020 this week to discuss the company’s approach to smartphone security. She stressed the company’s opposition to the creation of software backdoors into devices, and also said:

To read this article in full, please click here

Read more

6 ways hackers are targeting retail businesses

Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Categories:

Tags:

(Read more…)

The post 6 ways hackers are targeting retail businesses appeared first on Malwarebytes Labs.

Read more

Threat hunting in Azure Advanced Threat Protection (ATP)

Credit to Author: Todd VanderArk| Date: Tue, 07 Jan 2020 17:00:53 +0000

DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.

The post Threat hunting in Azure Advanced Threat Protection (ATP) appeared first on Microsoft Security.

Read more