At last, the real issue when big (or small) companies get hacked and control of collected PII is lost…

If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …

Reflections

Science Fiction Contact Lenses

Here is a threat that is being actively researched, but probably is not that big a deal – that is of course until we get to reality resolution screens and webcams… [2205.03971] Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing (arxiv.org) However… The …

If there is way for threat actors to abuse legitimate tools, of course they do it!

Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …