Category Archives: Blog

Some Android Apps To Receive Your Data Without Permission

When it works, Android’s app permissions are awesome. They’re straightforward and easy to understand. When you install a new app on your phone, you’ll get a popup box that gives you a summary of what permissions the app says it needs. Then, you have the option to either accept or deny it that permission. Sometimes, […]

New Ransomware Targets Network Attached Storage Devices

Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer.  The new strain has been dubbed “QNPCrypt” by Intezer and eCh0raix” by Anomail and is written in the Go programming language.  When it encrypts files, it chances the file extension to “.encrypt” […]

Google Home Device Recordings May Not Be Private

Do you own a Google Home?  If so, you probably find it to be indispensable.  It’s a powerful, genuinely helpful piece of technology, but there’s a catch.  It’s so good and so useful because it listens constantly for voice commands from you.  Those commands get recorded. Recently, Google acknowledged that it hires third-party contractors to […]

Apple Turns Off Mac OS Feature For Security Concerns

Apple is in the news again, but not for anything good. Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer’s webcam without alerting the computer’s owner. The problem is a program called Zoom. The Zoom software installs a web server on the owner’s computer, […]

Unsecured Database May Have Exposed Some Big Companies

An UpGuard research team recently discovered several unsecured Amazon S3 buckets belonging to the Israeli IT Services firm Attunity. The company left the buckets unsecured, exposing more than a terabyte of sensitive information belong to a number of prominent companies including Ford, TD Bank and Netflix. To provide a sense of scale, Attunity has more […]