Is your smartphone spying on you?

ome popular apps on your phone may be secretly taking screenshots of your activity and sending them to third parties, according to a new study by a team of Northeastern researchers. The researchers said this is particularly disturbing because these screenshots—and videos of your activity on the screen—could include usernames, passwords, credit card numbers, and […]

Read more

Security Risk: Computer chip bugs still an Issue

Security researchers have found eight novel flaws in computer chips that are similar to the “serious” bugs found earlier this year. In January, computer firms rushed to fix the Meltdown and Spectre flaws that, under certain conditions, allowed attackers to steal data. The latest discoveries let data be stolen in similar ways and have been […]

Read more

Cybercriminals target pharmaceutical organisations

Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has been detected in pharmaceutical organisations in Vietnam, aimed at stealing precious drug formulas and business information. PlugX malware is a well-known remote access […]

Read more

Facebook: The war against scammers

Facebook was warned by security researchers that attackers could abuse its phone number and email search facility to harvest people’s data. On Wednesday, the firm said “malicious actors” had been harvesting profiles for years by abusing the search tool. It said anybody that had not changed their privacy settings after adding their phone number should […]

Read more

Increase in swarm cyberattacks targeting IoT devices

Fortinet, a provider in broad, integrated and automated cybersecurity solutions, has announced the findings of its latest Global Threat Landscape Report. The research reveals that attacks per firm increased over the previous quarter. In addition, automated and sophisticated swarm attacks are accelerating making it increasingly difficult for organisations to protect users, applications, and devices.   […]

Read more