Fleeceware apps persist on the Play Store

Credit to Author: Jagadeesh Chandraiah| Date: Tue, 14 Jan 2020 13:30:10 +0000

Fleeceware remains a problem on Google Play, where Android users still run the risk of being charged hundreds of dollars or euros for “subscriptions” to apps<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LoJDdyoq4vs” height=”1″ width=”1″ alt=””/>

Read more

‘Cable Haunt’ vulnerability exposes 200 million cable modem users

Credit to Author: John E Dunn| Date: Tue, 14 Jan 2020 11:41:45 +0000

A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt – complete with eye-catching logo.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/xgn6q9BSap4″ height=”1″ width=”1″ alt=””/>

Read more

Google tests biometric authentication for Android autofill

Credit to Author: Danny Bradbury| Date: Tue, 14 Jan 2020 11:31:33 +0000

Google is testing out a feature to make Android’s built-in password manager safer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Bv2NtaVOe80″ height=”1″ width=”1″ alt=””/>

Read more

Lottery hacker gets 9 months for his £5 cut of the loot

Credit to Author: Lisa Vaas| Date: Tue, 14 Jan 2020 11:18:57 +0000

We don’t care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/MQxKTz5FL8E” height=”1″ width=”1″ alt=””/>

Read more

Microsoft now reviewing Skype audio in ‘secure’ places (not China)

Credit to Author: Lisa Vaas| Date: Tue, 14 Jan 2020 10:51:15 +0000

A former contractor in Beijing: “It sounds a bit crazy now […] that they gave me the URL, a username and password sent over email.”<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/MmxOcairoTY” height=”1″ width=”1″ alt=””/>

Read more

Facebook prohíbe los deepfakes, pero no los cheapfakes o shallowfakes

Credit to Author: Naked Security| Date: Mon, 13 Jan 2020 09:06:05 +0000

Facebook ha prohibido algunos vídeos manipulados, pero solo los que están hechos con tecnologías sofisticadas, como la inteligencia artificial (IA), de una manera que una persona normal no detectaría fácilmente. Lo que no prohíben son vídeos hechos con un simple software de edición de vídeo, o lo que los investigadores de la desinformación llaman &#8220;cheapfakes&#8221; [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/WvWokdzYeSs” height=”1″ width=”1″ alt=””/>

Read more

Powerful GPG collision attack spells the end for SHA-1

Credit to Author: Danny Bradbury| Date: Mon, 13 Jan 2020 13:54:29 +0000

New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/4sQ-pLfUpIU” height=”1″ width=”1″ alt=””/>

Read more