Is your online identity protected?

The less you reveal about your location the more secure your connection. Take control over the information you allow to be visible on the internet.

A virtual private network (VPN) extends your private network across the Internet. It enables you to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. This means you can protect your data and IP address.  A Virtual Private Network (VPN) is your first line of defense on the internet.

Current Security News

Protecting your computer against Intel’s latest security flaw is easy, unless it isn’t – The Verge

Protecting your computer against Intel’s latest security flaw is easy, unless it isn’t  The Verge

The new vulnerabilities are built into Intel hardware and go by various names. ZombieLoad, Fallout, or RIDL are the catchy ones; the more technical name is …

“computer security news” – read more

WhatsApp hack: have I been affected and what should I do?

Vulnerabilities are discovered all the time and each is added to a hacker’s armoury, and they are often combined … While constant Windows or Mac OS updates can be annoying, they are also critical …
mac hacker – read more

Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat? – CPO Magazine

Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat?  CPO Magazine

A group of skilled Russian hackers with a history of infiltrating high-profile targets claim to have stolen the source code used by three major anti-malware …

“malware news” – read more

Protecting your computer against Intel’s latest security flaw is easy, unless it isn’t

You’re forgiven if the huge Intel chip vulnerability disclosure from a couple of days ago slipped under your radar. For one thing, the new problems are sort of variants of the much splashier Spectre …
computer security – read more

Forbes subscribers warned of Magecart threat skimming credit card details

The notorious Magecart malware, that blights online stores by stealing payment card details from unsuspecting shoppers at checkout, has claimed another high profile victim.

Read more in my article on the Tripwire State of Security blog.

Graham Cluley

Cyber attacks are rewriting the ‘rules’ of modern warfare – Delano.lu

Cyber attacks are rewriting the ‘rules’ of modern warfare  Delano.lu

Governments are becoming ever more reliant on digital technology, making them more vulnerable to cyber attacks. In 2007, Estonia was attacked by …

“cyber warfare news” – read more

Internet Security Market Analysis by Top Key Players IBM, Hewlett Packard, Microsoft Corp., Cisco System Inc., Intel Corporation, Trend Micro

The industry is gaining traction among commercial internet users as a result rising rates of data theft from remote access locations and false impersonation from physical environments. Cyber threats …
internet security – read more

Big tech ‘lawyering up’ to challenge data breach fines – The Irish Times

Big tech ‘lawyering up’ to challenge data breach fines  The Irish Times

Seen & heard: FAO Scwharz toys for Dublin; Dutch target incinerator stake.

“data breach” – read more

The Big E-Crime Pivot – Dark Reading

The Big E-Crime Pivot  Dark Reading

Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and …

“exploit kit” – read more

Cyber attacks are rewriting the ‘rules’ of modern warfare—and we aren’t prepared for the consequences – Phys.Org

Cyber attacks are rewriting the ‘rules’ of modern warfare—and we aren’t prepared for the consequences  Phys.Org

Governments are becoming ever more reliant on digital technology, making them more vulnerable to cyber attacks. In 2007, Estonia was attacked by …

“cyber warfare news” – read more

Huawei responds to Android ban with service and security guarantees, but its future is unclear – TechCrunch

  1. Huawei responds to Android ban with service and security guarantees, but its future is unclear  TechCrunch
  2. Huawei responds to Android ban  The Verge
  3. Google cuts Huawei’s Android access to app and security updates  TechRadar
  4. Huawei issues first statement after Android ban, confirms devices will still receive security updates  9to5Google
  5. Google’s Huawei restrictions are a wake-up call for all Android phone makers  VentureBeat
  6. View full coverage on read more

“android security news” – read more

Huawei Smartphones Will Lose Google Android Software And Services, Reports Claim – Forbes

Huawei Smartphones Will Lose Google Android Software And Services, Reports Claim  Forbes

Days after U.S. President Donald Trump signed an executive order aimed at cutting off Huawei’s U.S. supply chain and sales pipeline, the impact will be hitting …

“android security news” – read more

T-Mobile OnePlus 6T security update now rolling out – TmoNews

T-Mobile OnePlus 6T security update now rolling out  TmoNews

Samsung’s Galaxy S10 phones aren’t the only Android devices getting an update from T-Mobile today. The OnePlus 6T is now receiving a software update on …

“android security news” – read more

T-Mobile updating Galaxy S10, S10+, and S10e with new security patches – TmoNews

T-Mobile updating Galaxy S10, S10+, and S10e with new security patches  TmoNews

One week after T-Mobile updated its Galaxy S10, S10+, and S10e, it’s begun pushing another update to Samsung’s flagship phones. T-Mobile is updating the …

“android security news” – read more

Make public aware of mobile security threats: Governor – The Hindu

Make public aware of mobile security threats: Governor  The Hindu

Governor E.S.L. Narasimhan has said there is an urgent need to bring awareness among the public on mobile phone security threats and precautions to be …

“mobile security news” – read more

Mobile Risks Boom in a Post-Perimeter World

The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world.
Mobile Security – Threatpost