Location
Temu is Malware — It Sells Your Info, Accuses Ark. AG
Richi Jennings | | breach of privacy, china, china espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, customer location, geofencing and location tracking, geolocation, Location, location access permission, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location services, location sharing location tracking, PDD Holdings, Pinduoduo, Privacy, SB Blogwatch, Temu, Whaleco
Chinese fast-fashion-cum-junk retailer “is a data-theft business.” ...
Security Boulevard
Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk
Richi Jennings | | access management, ASX:360, Chris Hulls, content scraping, data scraping, enumeration, Enumeration Attacks, Ex-Employee Credentials, geofencing and location tracking, geolocation, Identity & Access Management, identity and access management, Identity and Access Management (IAM), Life360, Location, location data, Location data privacy, location finder app, location history, location intelligence, location privacy, location sharing location tracking, preventing possible attempt to enumerate users, SB Blogwatch, scraper, Scrapers, Scraping, Tile, user enumeration
Location tracking service leaks PII, because—incompetence? Seems almost TOO easy ...
Security Boulevard
Apple API Allows Wi-Fi AP Location Tracking
Richi Jennings | | Apple, apple bug, customer location, geofencing and location tracking, geolocation, GPS location, Location, location access risks, location data, Location data privacy, location privacy, location services, location sharing location tracking, SB Blogwatch, Skyhook, Starlink, Tibro, Wi-Fi, wi-fi security
Privacy FAIL: Apple location service returns far more data than it should—to people who have no business knowing it—and without your permission ...
Security Boulevard
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard
Shady Tracking Firms Are Selling Your GPS Location History
Richi Jennings | | Cybersecurity, GPS, Information Security, Location, Privacy, SB Blogwatch, security
In a worrying report, the Gray Lady is waking up Americans to the silent world of smartphone location tracking and brokerage ...
Security Boulevard
Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Richi Jennings | | Apple, Cybersecurity, Information Security, iPhone 11, Location, Privacy, SB Blogwatch, security, Security News
Why is Apple so bad at answering simple questions? ...
Security Boulevard
Malware Misuses Common Operating System Commands to Perform Targeted Attacks
Joe Darbyshire | | country, Location, Malware, OS language, region, Targeted Attack, threats, Ursnif
We previously posted a blog about the Ursnif family of malware using language checks to determine the end user’s location as a means of bypassing sandbox-based endpoint protection during regionally targeted attacks ...
Location-Aware Malware Targets Japanese and Korean Endpoints
Joe Darbyshire | | DateAndTime, excel, image, Japan, Korea, Location, Malware, Microsoft, threats, ZeRo
New malware samples use location awareness to specifically target Japanese and Korean endpoints. The malware uses two techniques to determine the location in which it is being executed and ensures that the ...
The Shared Security Weekly Blaze – Polar Fitness App Location Data Exposed, Blocking Scam Phone Calls, Samba TV Privacy Controversy
Tom Eston | | android, api, Apple, geolocation, google, ios, Location, Phone Calls, phone scams, Podcast Episodes, Polar, Privacy, scam, Scams, Weekly Blaze Podcast
This is the Shared Security Weekly Blaze for July 16th, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...