iPhone holes and Android malware – how to keep your phone safe

Credit to Author: Paul Ducklin| Date: Fri, 16 Aug 2019 14:13:44 +0000

Watch the latest Naked Security Live video for our non-technical tips to improve your online safety, whichever type of phone you prefer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wlXfZPzm5No” height=”1″ width=”1″ alt=””/>

Read more

Serious flaws in six printer brands discovered, fixed

Credit to Author: Danny Bradbury| Date: Thu, 15 Aug 2019 13:03:19 +0000

There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/nskUwQnmN2Q” height=”1″ width=”1″ alt=””/>

Read more

Hacked devices can be turned into acoustic weapons

Credit to Author: Lisa Vaas| Date: Tue, 13 Aug 2019 13:54:10 +0000

Security researcher Matt Wixey found that many gadgets aren’t protected from being turned into hearing-damaging weapons. Or melting.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/S9CML6xBVTQ” height=”1″ width=”1″ alt=””/>

Read more

Apple will hand out unlocked iPhones to vetted researchers

Credit to Author: Lisa Vaas| Date: Mon, 12 Aug 2019 11:44:22 +0000

It formalizes the reality: “pre-jailbroken” iPhones were already on the black market.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/SFMBPoyjIsk” height=”1″ width=”1″ alt=””/>

Read more

Update your iPhone – remote control holes revealed by researchers

Credit to Author: Paul Ducklin| Date: Thu, 08 Aug 2019 14:01:41 +0000

You might not think your phone is as exposed as an internet server – but it’s handling plenty of untrusted data from unknown sources!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Ri0849b3RDo” height=”1″ width=”1″ alt=””/>

Read more

A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

Credit to Author: Eric Avena| Date: Wed, 07 Aug 2019 23:50:25 +0000

Through a cross-company, cross-continent collaboration, we discovered a vulnerability, secured customers, and developed fix, all while learning important lessons that we can share with the industry.

The post A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response appeared first on Microsoft Security.

Read more