The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.
from Naked Security https://ift.tt/3aOyE93
via IFTTT
The man became a suspect because location data from his Android phone was swept up in a surveillance dragnet called a geofence warrant.
from Naked Security https://ift.tt/3aOyE93
via IFTTT
Crime doesn’t pay, even if you have the audacity to try to sell your employer its own, free software and personal data on your own colleagues.
from Naked Security https://ift.tt/2IwNAfR
via IFTTT
US carriers haven’t been doing enough to block robocalls voluntarily. The Federal Communications Commission’s response? Fine – we’ll make you.
from Naked Security https://ift.tt/38FHyE2
via IFTTT
If you lose someone’s data because of a configuration blunder that lets crooks in without any actual hacking… is that a “breach” or not?
from Naked Security https://ift.tt/2wEAeLM
via IFTTT
How long do Android devices continue to receive security updates after they’re purchased? The answer is: barely two years.
from Naked Security https://ift.tt/2Ty3Pzo
via IFTTT
Microsoft has finally clarified how users can fix a Windows security measure that has been causing hardware problems: turn it off.
from Naked Security https://ift.tt/2VYZsiK
via IFTTT
The US government is tightening its rules around the registration of government web domains to stop fraudsters impersonating government sites.
from Naked Security https://ift.tt/2wGr6pU
via IFTTT
Cybercriminals compromise over a million Microsoft enterprise accounts each month as too few customers use multi-factor authentication.
from Naked Security https://ift.tt/38EUiuB
via IFTTT
From an ultrasonic attack on Siri and Google Assistant to the guy who hacked back at tech support scammers – and everything in between.
from Naked Security https://ift.tt/2PXzet5
via IFTTT
To celebrate International Women’s Day we invite you to this all-female splinter episode.
from Naked Security https://ift.tt/2IAoMTX
via IFTTT