Felix Krause, a privacy consultant and one time Google engineer has an article examining how Meta tracks users when they follow links from Meta websites using the iOS apps: iOS Privacy: Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause (krausefx.com) …
The money involved in ransomware
Research has shown that payments to threat actors, demanded by ransomware, has dropped, but the double action of stealing the data and threatening exposure and encrypting that data at source is increasing: Ransom payments fall as fewer victims choose to pay hackers (bleepingcomputer.com) This next story wasn’t really surprising, that …
Was Apple networking diverted through Russia?
Russia’s Rostelecom appears to have tried to route some of Apple’s network, via its servers. It did not go on for long as Apple engineers intervened. If you want to know how some users across the internet trying to connect to Apple services could have been directed to Rostelecom servers, …
Continue reading “Was Apple networking diverted through Russia?”
How secure is open source software? Do you use open source software or have software written for you? If so read on… UPDATED
When we undertake any cyber security survey, and we ask about software, we know the greatest amount of work we will have to do, is when the client says “we had this written for us” or we use this “open source software”. (We will not get into Android apps or …
Email scams – how hard is it to spot them?
This was going to be a “weekend read” but I thought it was important enough to be part of the main news feed. For an email phishing scam to work it has to, in some way, make you trust it. This exploitation of your trust is called social engineering and …
Continue reading “Email scams – how hard is it to spot them?”