In most cases we all spend quite a bit money on our phones – Diana will tell you I spend too much! But whatever we spend, we all have an expectation of them lasting a number of years. However, when is a smartphone worn out? When the battery is no …
Known Exploited Vulnerabilities
Keeping track of the software and hardware you use, that then are discovered to have security flaws in them is important, especially if those flaws are being exploited by threat actors. The quicker you or the people responsible for your cyber security know there are issues, the quicker any available …
AirTag stalking – could it be a thing of the past?
I have written about the privacy issues surrounding Apple AirTags and similar gadgets. They were originally made to enable careless people (like me) find our keys and other things that get misplaced. It did not take people long to realise they could also track people with them. This is a …
Continue reading “AirTag stalking – could it be a thing of the past?”
CISA adds seven vulnerabilities to the Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency has issued security advisories for Microsoft and Samsung products: CISA Adds Seven Known Exploited Vulnerabilities to Catalog | CISA
Privacy enhancement to Samsung phones
Samsung Maintenance Mode – this is a good idea, that has been a long time coming: New Samsung Maintenance Mode protects your data during phone repairs (bleepingcomputer.com) But only for those users who have the right Galaxy devices and living in the right countries! Privacy for some of their valued …