Italy’s Antitrust Regulator Fines Google and Apple for “Aggressive” Data Practices

Italy’s antitrust regulator has fined both Apple and Google €10 million each for what it calls are “aggressive” data practices and for not providing consumers with clear information on commercial uses of their personal data during the account creation phase. The Autorità Garante della Concorrenza e del Mercato (AGCM) said

0 Comments

Smishing kicks into high gear as scammers use package delivery texts as clickbait

Proofpoint finds that bad actors are using SMS messages about package deliveries as the bait in new scams. Image: panuwat phimpha More about cybersecurity ‘Tis the season for scammers to use SMS messages to deliver malicious links straight to your phone. Proofpoint warns that bad actors are taking advantage of

0 Comments

Leaders agree that cybersecurity is a business risk, but are they acting on that belief?

Despite nearly unanimous agreement, there’s still a lack of clarity on who is accountable for security incidents and whether previous security investments have paid off, a Gartner survey finds. Image: William_Potter, Getty Images/iStockphoto A Gartner survey of the members of various boards of directors finds that, while 88% believe that

0 Comments

GoDaddy Breach Widens to Include Reseller Subsidiaries

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

When Will Security Frameworks Catch Up With the New Cybersecurity Normal?

Now that the system shock to IT systems and organizations from the pandemic (not to mention the horrible human toll) has started to ease up, we’re seeing the emergence of a whole new landscape for cybersecurity. Before last year, most organizations relied mostly on an in-person workforce in company-owned or

0 Comments

Why Should I Adopt a Zero-Trust Security Strategy?

Question: Why should I adopt a zero-trust security approach? Ash Devata, general manager, Cisco Zero-trust and Duo Security: First and foremost, a zero-trust approach is the right thing to do for the security of the organization and the protection of your end users. The bottom line is that a zero-trust approach

0 Comments

Hackers Targeting Biomanufacturing Facilities With Tardigrade Malware

An advanced persistent threat (APT) has been linked to cyberattacks on two biomanufacturing companies that occurred this year with the help of a custom malware loader called “Tardigrade.” That’s according to an advisory published by Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) this week, which noted that the malware is

0 Comments

If you’re serious about privacy, it’s time to use DuckDuckGo as your default Android browser

Third-party app trackers have become a real problem on Android, and DuckDuckGo is doing something about it. Find out why Jack Wallen believes this is the browser you need to use. Image: GettyImages/gremlin In the never-ending battle for privacy on mobile phones, I seem to be forever searching for the

0 Comments

MediaTek Chip Flaw Could Have Let Attackers Spy on Android Phones

Newly discovered vulnerabilities in MediaTek chips, embedded in 37% of smartphones and Internet of things (IoT) devices around the world, could have enabled attackers to eavesdrop on Android users from an unprivileged application. The vulnerabilities specifically exist in a part of the MediaTek system-on-chip that handles audio signals, Check Point

0 Comments

Get 1,000 hours of cybersecurity training for $21 this Black Friday

Stay up to date for a lifetime with this cybersecurity training bundle with more than 1,000 hours of instruction. Image: Jaiz Anuar/Shutterstock Cybersecurity is one of the most important growing industries in IT. With that importance comes a steep learning curve and a competitive job market. You can start your cybersecurity

0 Comments