Cybersecurity

Mobile Apps Are Selling Your Location

https://www.tomsguide.com/us/apps-selling-location,news-28798.html Back in October, Tom’s Guide reportedthat it’s possible for cheap mobile advertisements to spy on you through your phone. Sales of location-targeted advertising reached an estimated $21 billion this year. This morning, a report from the New York Times warns that smartphone apps do that also for profit: More than 1,000 popular apps contain

The computer virus is born, November 10, 1983 | EDN

https://www.edn.com/electronics-blogs/edn-moments/4437117/The-computer-virus-is-born–November-10–1983 On this day in technology history, a graduate student’s self-replicating code that could gain control of a system inspired the term “computer virus”. In his 1983 paper “Computer Viruses – Theory and Experiments,” Cohen defined a computer virus as “a program that can infect other programs by modifying them to include a possibly evolved

Microsoft suspends Windows 10 update, citing data loss reports | TechCrunch

https://techcrunch.com/2018/10/06/microsoft-suspends-windows-10-update-citing-data-loss-reports/ A few day after making the latest version of Windows 10 available to users, Microsoft has suspended the update: “We have paused the rollout of the Windows 10 October 2018 Update (version 1809) for all users as we investigate isolated reports of users missing some files after updating,” the company writes on its support

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? — Krebs on Security

https://krebsonsecurity.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/ You can have it fast, cheap, or secure — pick any two. It seems to be possible as long as “secure” isn’t one of your choices. “Our IT industry is inexorably international, and anyone involved in the process can subvert the security of the end product,” Schneier wrote. We don’t often hear about intentional

Steve Gibson’s Three Router Solution to IOT Insecurity

https://www.pcper.com/reviews/General-Tech/Steve-Gibsons-Three-Router-Solution-IOT-Insecurity Here are some useful tips for securing networks that have IoT devices: Even before the formulation of the term “Internet of things”, Steve Gibson had proposed home networking topology changes designed to deal with this looming IoT security threat. Unfortunately it seems that only little or no thought is given to the security aspects