How Android Phones Hide Missed Security Updates From You

How Android Phones Hide Missed Security Updates From You l33tdawg Tue, 04/24/2018 – 19:50 more…

10 types of hackers and how they’ll harm you

Hacker profiles Image by Getty Images / jokerpro Hackers—and the malware they build and use—have grown up in the last couple of decades. When computers were big putty-colored boxes, hackers were just learning to walk and their pranks were juvenile — maybe they would create a bit of silly malware that did little more than […] more…

Clear Scope for Conflict Between Privacy Laws

The Clarifying Lawful Overseas Use of Data Act, or CLOUD Act, was enacted into U.S. federal law on March 23, 2018. It had been attached, at page 2212 of 2232 pages, to the omnibus spending bill, and allows law enforcement to demand access to data of concern wherever in the world that data is stored. […] more…

Vulnerability in NVIDIA Tegra Chipsets Allows for Code Execution

A vulnerability in NVIDIA’s Tegra chipsets allows for the execution of custom code on locked-down devices, security researcher Kate Temkin reveals. read more more…

Police try (and fail) to unlock phone with a dead man’s finger

The practice doesn’t require a warrant but it left relatives feeling “disrespected and violated.” more…

Ex-Reddit mogul apologizes for making the world ‘a worse place’

“[Reddit] is awful and it’s gonna get worse.” more…

Security Calling: Celebrate National Telephone Day by Securing Your Mobile Devices

April 25 – otherwise known as National Telephone Day – rolls around once a year to remind us of the sheer technologic prowess and influence of the phone. What first started as an industrial revolution invention from Alexander Graham Bell, the phone has undergone quite a remarkable evolution over its nearly 150 years of existence. […] more…

Hackers Can Steal Cryptocurrency From Air-Gapped Wallets: Researcher

Air-gapped cryptocurrency wallets are believed to hold private keys stored in them secure, but an Israeli researcher has demonstrated that attackers can leak the keys from such wallets in a matter of seconds. read more more…

Can a commercial VPN really keep you anonymous? [VIDEO]

Are VPNs about privacy, about anonymity, or about both? more…

Google Project Zero pulls the rug out from under Microsoft (again)

Google goes public with Windows 10 S bypass flaw after Microsoft misses another patching deadline more…

Mingis on Tech: All about Android security

One of the many topics techies like to debate is whether Google’s Android or Apple’s iOS is more inherently secure. Sure, Apple has a closed system that makes it harder for iPhone users to get into trouble. But the frequent headlines about Android malware usually miss the point. As Computerworld‘s JR Raphael explains, an Android user […] more…

Mingis on Tech: The lowdown on Android security

Google’s Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that’s a misconception and how users can keep their devices safe. more…

New Georgia law criminalizes good-faith security research, permits vigilante action

The state of Georgia is trying to ban good-faith cybersecurity research, and the state’s cybersecurity businesses are hoppin’ mad. SB 315, The Unauthorized Computer Access Bill, currently sitting on Governor Nathan Deal’s desk, threatens to outlaw good-faith security research and enable “hack back” vigilante action. [ Keep up with 8 hot cyber security trends (and […] more…

The best privacy and security apps for Android

Let’s get one thing out of the way right off the bat: If you’re looking for recommendations about Android security suites or other malware-scanning software, you’ve come to the wrong place. Why? Because, like most people who closely study Android, I don’t recommend using those types of apps at all. Android malware isn’t the massive […] more…

Microsoft cites 24% jump in tech support scams

Reports of tech support scams jumped by 24% last year, Microsoft said, with loses by the bilked averaging between $200 and $400 each. “Scammers continue to capitalize on the proven effectiveness of social engineering to perpetrate tech support scams,” Erik Wahlstrom, Windows Defender research project manager, wrote in a post last week to a Microsoft […] more…

Code Execution Flaws Patched in Foxit PDF Reader

Foxit has addressed over a dozen vulnerabilities in their PDF Reader, a free application that provides users with an alternative to Adobe Acrobat Reader. read more more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News