location sharing location tracking
Temu is Malware — It Sells Your Info, Accuses Ark. AG
Richi Jennings | | breach of privacy, china, china espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, customer location, geofencing and location tracking, geolocation, Location, location access permission, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location services, location sharing location tracking, PDD Holdings, Pinduoduo, Privacy, SB Blogwatch, Temu, Whaleco
Chinese fast-fashion-cum-junk retailer “is a data-theft business.” ...
Security Boulevard
Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk
Richi Jennings | | access management, ASX:360, Chris Hulls, content scraping, data scraping, enumeration, Enumeration Attacks, Ex-Employee Credentials, geofencing and location tracking, geolocation, Identity & Access Management, identity and access management, Identity and Access Management (IAM), Life360, Location, location data, Location data privacy, location finder app, location history, location intelligence, location privacy, location sharing location tracking, preventing possible attempt to enumerate users, SB Blogwatch, scraper, Scrapers, Scraping, Tile, user enumeration
Location tracking service leaks PII, because—incompetence? Seems almost TOO easy ...
Security Boulevard
Apple API Allows Wi-Fi AP Location Tracking
Richi Jennings | | Apple, apple bug, customer location, geofencing and location tracking, geolocation, GPS location, Location, location access risks, location data, Location data privacy, location privacy, location services, location sharing location tracking, SB Blogwatch, Skyhook, Starlink, Tibro, Wi-Fi, wi-fi security
Privacy FAIL: Apple location service returns far more data than it should—to people who have no business knowing it—and without your permission ...
Security Boulevard
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard
8 Reasons Mobile Apps Access Location + Security Policies to Consider
Su Mon Kywe | | enterprise data loss, enterprise policies, gps tracking, location access permission, location access risks, location sharing location tracking, mobile app location tracking, mobile app risks, Mobile Security, Mobile Security Insights, mobile security policies, Mobile Security Tips, when in use
A fitness app, called Polar Flow, was recently found to be exposing the name, profile picture and whereabouts of high-ranking military personnel by oversharing user location data. Unfortunately, this is not the ...