Privacy

Small companies are attractive targets for cybercriminals because they don’t have the resources to combat it like the more prominent companies. Or they’re hoping that they don’t. Has a data breach compromised your company? Consider bringing in a digital forensics investigator that can root out any security issues they find when examining your setup. They’re […]

The post Data Protection: Making Sure that Your Customers’ Information is Secure appeared first on CyberDB.

Read More Data Protection: Making Sure that Your Customers’ Information is Secure

Deepfake expert Nina Schick joins us as we discuss synthetic media, Facebook’s latest data fiasco, and some less-than-brilliant April Fool’s tricks.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” p…

Read More Smashing Security podcast #222: Facebook, deepfakes, and April Fools scandals – with Nina Schick

According to Wired, Signal is adding support for the cryptocurrency MobileCoin, “a form of digital cash designed to work efficiently on mobile devices while protecting users’ privacy and even their anonymity.”

Moxie Marlinspike, the creator of Signal and CEO of the nonprofit that runs it, describes the new payments feature as an attempt to extend Signal’s privacy protections to payments with the same seamless experience that Signal has offered for encrypted conversations. “There’s a palpable difference in the feeling of what it’s like to communicate over Signal, knowing you’re not being watched or listened to, versus other communication platforms,” Marlinspike told WIRED in an interview. “I would like to get to a world where not only can you feel that when you talk to your therapist over Signal, but also when you pay your therapist for the session over Signal.”…

Read More Signal Adds Cryptocurrency Support

Modern technology is becoming one of the best ways to make businesses operate more efficiently. The demand for cyber security management has skyrocketed and that is a concept that a lot of people are not even familiar with.  This guide is going to take an in-depth look at cyber security management and help you to […]

The post What Do You Need to Know About Cyber Security Management? appeared first on CyberDB.

Read More What Do You Need to Know About Cyber Security Management?

According to recent reports, cyberattacks are occurring every 39 seconds in the US. Sounds impressive, doesn’t it? What’s more, one attack can harm millions of people. For example, when Atlanta was attacked using ransomware called SamSam, the city was offline for five days, which halted several significant citywide operations. As a result, the amount of […]

The post Cybersecurity Tips for Students at Home and in School 2021 appeared first on CyberDB.

Read More Cybersecurity Tips for Students at Home and in School 2021

According to a report published by researchers at PrivacySavvy, many travel companies expose users’ data through their booking apps. In a report published on the 16th of March by PrivacySavvy, many travel companies expose users’ data through their booking apps. PrivacySavvy is a digital security company on a mission to educate internet users on issues […]

The post Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports appeared first on Security Affairs.

Read More Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports

There has been more than enough to worry about for the small business owner in the last 12 months. The checklist of things that have changed overnight probably covers every aspect of their business, foremost amongst them possibly that their entire workforce could now be working remotely. While getting a company through the last 12 […]

The post Why cybersecurity is one of the things your business cannot afford to take lightly appeared first on CyberDB.

Read More Why cybersecurity is one of the things your business cannot afford to take lightly

Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:

Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports. This paper presents the first comprehensive security and privacy analysis of OF. To this end, we recover the specifications of the closed-source OF protocols by means of reverse engineering. We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user’s top locations with an error in the order of 10 meters in urban areas. While we find that OF’s design achieves its privacy goals, we discover two distinct design and implementation flaws that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, which could deanonymize users. Apple has partially addressed the issues following our responsible disclosure. Finally, we make our research artifacts publicly available…

Read More Security Analysis of Apple’s “Find My…” Protocol

A group of hackers claimed to have compromised more than 150,000 surveillance cameras at banks, jails, schools, and prominent companies like Tesla and Equinox. A group of US hackers claimed to have gained access to footage from 150,000 security cameras at banks, jails, schools, healthcare clinics, and prominent organizations. The news was first reported by […]

The post White hat hackers gained access more than 150,000 surveillance cameras appeared first on Security Affairs.

Read More White hat hackers gained access more than 150,000 surveillance cameras

ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection. ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users. The settlement has yet to be approved by a federal judge. The Chinese firm was accused to have failed […]

The post ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection appeared first on Security Affairs.

Read More ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection

Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.”

From the introduction:

Treating data like it is property fails to recognize either the value that varieties of personal information serve or the abiding interest that individuals have in their personal information even if they choose to “sell” it. Data is not a commodity. It is information. Any system of information rights­ — whether patents, copyrights, and other intellectual property, or privacy rights — ­presents some tension with strong interest in the free flow of information that is reflected by the First Amendment. Our personal information is in demand precisely because it has value to others and to society across a myriad of uses…

Read More The Problem with Treating Data as a Commodity

The security breaches in cyber-security have been dominating the world for a long time. As cyber-attacks are growing rapidly, the chances of failing in this trap have been increasing. Having the necessary security measures in place still does not indicate that the IT infrastructure is free from risks. To ensure a better working environment and […]

The post Top 5 Reasons to Invest in Penetration Testing Today appeared first on CyberDB.

Read More Top 5 Reasons to Invest in Penetration Testing Today

An attacker demonstrated this week that Clubhouse chats are not secure, he was able to siphon audio feeds from “multiple rooms” into its own website While the popularity of the audio chatroom app Clubhouse continues to increase experts are questioning the security and privacy level it offers to its users. Recently the company announced it […]

The post An attacker was able to siphon audio feeds from multiple Clubhouse rooms appeared first on Security Affairs.

Read More An attacker was able to siphon audio feeds from multiple Clubhouse rooms