…do you get it checked? It may seem a strange thing to think about, surely the programmers know how to produce secure code? But recent research has shown that even the biggest organisations have coders who continuously leave valuable credentials embedded in their public facing apps. These transgressions often arise …
Let’s start this week with Android Malware
For the last couple of weeks we have started the week off with ransomware, this week for a change we will start the week with Android malware. Cybercrime service bypasses Android security to install malware – BleepingComputer I have reported on the steps Google has been taking is tightening up …
Continue reading “Let’s start this week with Android Malware”
Apple’s report into how it stops App Store crimes
I choose not to call them scams but crimes. The Apple App Store is well curated, that is one of Apple’s selling points for its products – the added security this curation brings. But of course, the threat actors are always looking for ways to squeeze past this curation. Apple …
Continue reading “Apple’s report into how it stops App Store crimes”
Watch where you download your Tor browser from…
…or any other software. Governments around the world, including for instance Russia, ban Tor web sites from the internet in their countries as it is a very effective way for users to conceal their IP address from authorities. However this had led to a rise in other sites offering Tor …
Continue reading “Watch where you download your Tor browser from…”