The Latest in IT Security

1

Not long ago, phishing attacks were fairly easy for the average Internet user to spot: Full of grammatical and spelling errors, and linking to phony bank or email logins at unencrypted (http:// vs. https://) Web pages. Increasingly, however, phishers are upping their game, polishing their copy and hosting scam pages over https:// connections — complete […]

Read more ...

1

Google Play’s security team has shared details of a family of Android malware spotted in the company’s official app store, capable of stealing sensitive data from social media apps and spying on WhatsApp, Viber, and Skype communications. Read More

Read more ...

1

Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more. Read More

Read more ...

1

Recently, Facebook announced a pilot program in Australia to block its users from uploading or sharing non-consensual intimate images, colloquially referred to as “revenge porn.” In conjunction with activists and the Australian eSafety Commissioner’s Office, this new program would create a digital fingerprint of these images and block matching images before they are uploaded or […]

Read more ...

Categories

FRIDAY, FEBRUARY 23, 2018

Featured

Archives

Latest Comments

Social Networks