Catch up with what the zero-day threat is, that your organisation is facing here: As a zero-day flaw is such a useful way in for threat actors to a system, it is no surprise that there is monetary value for zero-day vulnerabilities between hackers, for hacking, “legitimate” software who produce …
Where to start in 2024?
Happy New Year. I am going to start the cyber news for 2024 with a story that broke between Christmas and the New Year – Apple iPhone hardware vulnerabilities. I am a great supporter of the Apple iPhone and the associated “walled garden” App store as a good cyber security …
It is getting to be a habit…
…to end the week with a malicious Android app: APT41 hackers target Android users with WyrmSpy, DragonEgg spyware (bleepingcomputer.com) If you need to know why you need to pay attention to these Android (and sometime Apple iOS) smartphone app cyber security threats, then read on here: Just Check – CyberAwake …
Spyware hacked
LetMeSpy is advertised as software that can be installed on an Android device to allow parents to keep an eye on children or employers to monitor their staff. Both of which if done in the clear are a good idea, the employer option has some really positive outcomes when it …
Let’s finish the week where we started it – Android Malware
Here is a deep dive on the operation of the Predator Android malware by Bill Toulas of Bleeping Computer from research by Cisco Talos and the Citizen Lab. Predator: Looking under the hood of Intellexa’s Android spyware (bleepingcomputer.com) Predator is commercially available malware – only sold to governments or authorised …
Continue reading “Let’s finish the week where we started it – Android Malware”
AirTag stalking – could it be a thing of the past?
I have written about the privacy issues surrounding Apple AirTags and similar gadgets. They were originally made to enable careless people (like me) find our keys and other things that get misplaced. It did not take people long to realise they could also track people with them. This is a …
Continue reading “AirTag stalking – could it be a thing of the past?”
Kyocera Android App vulnerability but iOS users should not be smug…
Android apps need careful management We have an HP SoHo printer in the office, that the team use when they are here. The iPhone users use AirPrint the Android users use an approved app, as we have a BYOD policy in place for the all devices. This is especially important …
Continue reading “Kyocera Android App vulnerability but iOS users should not be smug…”