iPhone-Android: A Major Privacy Upgrade is Coming Soon

iPhone-Android: A Major Privacy Upgrade is Coming Soon

Image: vinnikava/Envato Elements Cross-platform encrypted messaging between iPhone and Android is coming soon, thanks to updated Rich Communication Services (RCS) standards. The GSM Association has announced that the latest RCS specifications now include end-to-end encryption based on the Messaging Layer Security protocol. This breakthrough, initially teased back in September, will finally allow secure, encrypted messaging between different mobile platforms. This is a huge privacy win — end-to-end encryption (E2EE) means nobody else can see your…

Read More

Billions of Devices at Risk of Hacking Due to Hidden Commands

Billions of Devices at Risk of Hacking Due to Hidden Commands

Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented “hidden commands.” Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth and Wi-Fi connections in numerous smart devices, including smartphones, laptops, smart locks, and medical equipment. Its popularity is partly due…

Read More

Managing risks in an evolving cybersecurity environment

Managing risks in an evolving cybersecurity environment

In today’s digital landscape, the rise of mobile device usage has made enterprises increasingly vulnerable to fraud. Recent research indicates that 76% of enterprises lack sufficient protection against voice and messaging fraud. This gap in security has become a critical vulnerability as smishing (SMS phishing) and vishing (voice phishing) surge following the recent developments in AI technology, which allows fraudsters to target more victims with increased sophistication. With 61% of enterprises reporting significant financial losses…

Read More

Protect 3 Devices With This Maximum Security Software

Protect 3 Devices With This Maximum Security Software

TL;DR: Protect your privacy on three devices with a 1-year subscription to Trend Micro Maximum Security for $19.99 (reg. $49.99). Cyber threats have become more sophisticated, and even cautious users can find themselves vulnerable to ransomware attacks, phishing schemes, and identity theft. A single click on the wrong link or a cleverly disguised email can lead to encrypted files, stolen credentials, or compromised accounts. Tech-savvy users know how to spot the signs of a scam…

Read More

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts. There’s a good chance you’re already using multi-factor verification with your other accounts — for your bank, your finances, your credit card, and any number of things. The way it requires an extra one-time code in addition to your login and password makes life far tougher for hackers. It’s increasingly common to see nowadays, where…

Read More

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation rental. To the quickest route around a traffic jam. And to a tasty burger. It’s a tremendous convenience. Yet, there’s a flip side. Your smartphone also tracks your location. Getting to know how your phone tracks you and how you can limit that tracking can make you far more private online. The basic privacy issue…

Read More

What is malware and why should I be concerned? | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware” is a mash-up of “malicious software.” It describes any type of software or code specifically designed to exploit a connected device or network without consent. And, unsurprisingly, hackers design most of it for financial gain. What kinds of malware are there? Think of malware as an umbrella term that covers an entire host of “bad…

Read More

10 Quick Tips for Mobile Security | McAfee Blog

Location, Location, Location: Three Reasons It Matters for Your Smartphone | McAfee Blog

All day long, it’s almost always within arm’s reach. Your smartphone. And we rely on it plenty. That makes securing your phone so important. Good thing that some of the best tips for making your phone safer are also some of the easiest. Here’s a quick rundown: Ten quick tips for mobile security 1. Lock your phone. Locking your phone is one of the most basic smartphone security measures you can take. Trouble is, few…

Read More

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all sorts of heebie-jeebies. The fun kind. Yet mobile threats like spyware, living dead apps, and botnets can conjure up all kinds of trouble.  Let’s get a rundown on the top mobile threats — then look at how you can banish them from your phone.  “I Know What You Did Because of Spyware”  Spyware is a…

Read More
1 2 3 8