Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
by Toni Birdsong on September 14, 2019 at 16:00
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase. […] The post Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know appeared first on McAfee Blogs.
Week in security with Tony Anscombe
by Gabrielle Ladouceur Despins on September 13, 2019 at 16:23
ESET researchers found an undocumented backdoor used by the infamous Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East. With the launch of the Safer Kids online initiative, a guide to help parents protect their kids when they take selfie. The discovery of a serious vulnerability The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Just how private are your browsing habits?
by Paul Ducklin on September 13, 2019 at 13:32
DNS-over-HTTPS sounds as though it should be safer than plain DNS, because of the "HTTPS" part - but not everyone is delighted about it...
Intel: SSH-stealing NetCAT bug not really a problem
by Danny Bradbury on September 13, 2019 at 13:17
There's another vulnerability in Intel chips, with another catchy name: NetCAT.
Leaky database full of fake Groupon emails turns out to belong to crooks
by Lisa Vaas on September 13, 2019 at 12:43
Crooks made bogus accounts to buy tickets with fake credit cards, resold them to unsuspecting buyers, and left the database-o-fraud wide open.
Mozilla Private Network VPN gives Firefox another privacy boost
by John E Dunn on September 13, 2019 at 10:47
Is this week's test pilot launch of Mozilla Private Network the moment browser VPNs finally become a must-have privacy feature?
Fin7 sysadmin pleads guilty to running IT for billion-dollar crime syndicate
by Lisa Vaas on September 13, 2019 at 10:17
Fedir Oleksiyovich Hladyr is the first member of the infamous cybercrime network to be found guilty of hacking-related crimes in a US court.
A vulnerability in Instagram exposes personal information of users
by Juan Manuel Harán on September 12, 2019 at 21:31
The bug, which has already been fixed by Facebook, allowed access to private user information that could be abused by malicious actors. The post A vulnerability in Instagram exposes personal information of users appeared first on WeLiveSecurity
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
by Gary Davis on September 12, 2019 at 18:54
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential car buyers don’t expect is to have their data exposed for all to see. But according to Threatpost, this story rings true for many prospective buyers. Over 198 million records containing personal, loan, and financial […] The post Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt appeared first on McAfee Blogs.
S2 Ep8: Facebook leak, $5m ransoms, DNS angst – Naked Security Podcast
by Alice Duckett on September 12, 2019 at 13:53
The latest Naked Security Podcast is live - listen now!
September 2019’s Patch Tuesday: 2 zero-days, 17 critical bugs
by John E Dunn on September 12, 2019 at 11:33
Sometimes, a Patch Tuesday update arrives with a bang that sends users scrambling for cover - September's update earns that description.
Massive email fraud bust snares 281 suspects
by Lisa Vaas on September 12, 2019 at 10:49
Operation reWired=tired cops worldwide! 167 suspects were cuffed in Nigeria and 74 in the US, among 8 other countries.
Google experiments with DNS-over-HTTPS in Chrome
by Danny Bradbury on September 12, 2019 at 10:24
Following hot on Mozilla's trail, Google officially announced its own DNS-over-HTTPS (DoH) experiment in Chrome this week.
Error-laden phone location data suspended from use in Danish courts
by Lisa Vaas on September 12, 2019 at 10:10
10,700 cases will be reviewed over 2 months, and 32 detainees have already been released after finding bugs in software and raw telecom data.
Countdown to MPOWER 2019: Survival Guide
by Melissa Gaffney on September 11, 2019 at 18:53
This year, we’re excited to host the 12th annual MPOWER Cybersecurity Summit at the ARIA in Las Vegas, where fellow security experts will strategize, network, and learn about the newest and most innovative ways to ward off advanced cyberattacks. With the show nearly upon us, I’m sharing a “survival guide” for first-time attendees and anyone […] The post Countdown to MPOWER 2019: Survival Guide appeared first on McAfee Blogs.