Our smartphones and other devices collect and then transmit massive amounts of data about us to dozens, maybe hundreds, of third-party companies every single day. This includes our location information, and the market for such information is huge. Naturally enough, the buying and selling goes on without our knowledge, creating obscure risks to our privacy. The recent hack of … [Read more...] about Gravy Analytics leak: How to protect your location data
protect
What scareware is and how to protect yourself
Imagine: you’re calmly working away on your computer, when suddenly a scary message appears on the screen: “Your computer is infected with viruses! Install an antivirus immediately!” or “Your data is at risk! Clean your system immediately!” Panic? That’s what the scammers are hoping for. This post explains what scareware is and why this threat is dangerous. We also give tips … [Read more...] about What scareware is and how to protect yourself
New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
Dec 31, 2024Ravie LakshmananData Security / Privacy The U.S. Department of Justice (DoJ) has issued a final rule carrying out Executive Order (EO) 14117, which prevents mass transfer of citizens' personal data to countries of concern such as China (including Hong Kong and Macau), Cuba, Iran, North Korea, Russia, and Venezuela. "This final rule is a crucial step forward in … [Read more...] about New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
Protect Against Adversary-in-the-Middle with Cisco’s User Protection Suite
In the blog, Understanding & Defending Against Adversary-in-the-Middle (AiTM) Attacks, we reviewed the basics of an AiTM attack and how Duo can protect against it. To recap, in an AiTM attack, the attacker sits in between the user and the real web page and steals a user’s valid session cookies. This means that they can bypass traditional authentication controls. Talos, … [Read more...] about Protect Against Adversary-in-the-Middle with Cisco’s User Protection Suite
Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate
Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True “Shift Left” DevSecOps Source link … [Read more...] about Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate
How to protect yourself from phishing and malware on GitHub and GitLab
One of the oldest security tips is: “Only download software from official sources”. “Official sources” are usually the main app stores on each platform, but for millions of useful and free open-source apps, the most “official” source is the developer’s repository on a dedicated site such as GitHub or GitLab. There, you can find the project’s source code, fixes and additions to … [Read more...] about How to protect yourself from phishing and malware on GitHub and GitLab
How to protect yourself from the pig butchering scam
Today, we’re discussing the increasingly common scam known as pig butchering. Due to its high profitability, this scheme is rapidly gaining popularity among fraudsters, and the number of victims is constantly growing. What is it? How does it work? And how can you protect yourself? We’ll cover it all in today’s post. What is pig butchering and how does this scam work? Pig … [Read more...] about How to protect yourself from the pig butchering scam
Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities
Dec 13, 2023NewsroomMobile Communication / Firmware security Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating system and preventing specific kinds of vulnerabilities. This comprises Integer Overflow Sanitizer (IntSan) and BoundsSanitizer (BoundSan), both of which are part of … [Read more...] about Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities
How to protect corporate routers and firewalls against hacking
Devices on the border between the internet and an internal corporate network — especially those responsible for security and network traffic management — are often a priority target for attackers. They arouse no suspicion when sending large volumes of traffic outward, and at the same time have access to the organization’s resources and to a significant portion of internal … [Read more...] about How to protect corporate routers and firewalls against hacking
Where Linux is in your home, and how to protect Linux devices from hacking
Over the first 23 years of this century, the Linux operating system has become as ubiquitous as Windows. Although only 3% of people use it on their laptops and PCs, Linux dominates the Internet of Things, and is also the most popular server OS. You almost certainly have at least one Linux device at home — your Wi-Fi router. But it’s highly likely there are actually many more: … [Read more...] about Where Linux is in your home, and how to protect Linux devices from hacking