Sunday, March 7

Security

Apple, Business, Facebook, Privacy & Cloud, Security

Apple CEO Tim Cook talks about privacy and targets social media companies like Facebook

Apple CEO Tim Cook spoke at the European Union data protection conference: CPDP, where he condemned companies that treat any compromise as a good compromise. During his talk, Cook covered Apple's concerns about privacy and security in technology, while also taking the opportunity to talk about some of the company's recent moves to help protect user privacy. For example, Cook praised the EU and its GDPR regulation for protecting user data and said it was time for the United States and other countries to pass similar laws. Additionally, Cook said that before massive technology platforms made it easy for ad giants to invade people's privacy, ad businesses thrived. He also pointed to Facebook, although he did not mention the name o...
Apple, Business, ios, News, Privacy & Cloud, Security

App Tracking Transparency Coming Soon to iOS and iPadOS

In a move that is sure to annoy the big dogs of advertising and delight privacy-conscious consumers, Apple is finally gearing up to launch its 'App Tracking Transparency' feature that limits the way iOS apps can track and share your data with third parties. This feature was first mentioned during the iOS 14 reveal at WWDC in the summer of 2020, but its release was later delayed until the spring of this year. With that said, spring is just around the corner, and the first versions of App Tracking Transparency will begin to block access to your iPhone or iPad identifier of advertisers (IDFA) in the upcoming beta version of iOS 14. If you're unfamiliar with data privacy, reading Apple's 'A Day in the Life of Your Data' report is a ...
Apple, Business, iOS 14, News, Privacy & Cloud, Security

Apple’s ‘A Day in the Life of Your Data’ is a data privacy manual worth reading

To celebrate Data Privacy Day, Apple has shared an easily digestible report called 'A day in the life of your data'which describes how people are tracked online and what they can do to protect themselves. The report focuses on a father and daughter on an afternoon date in the park to explain to people how daily tasks can lead to multiple trackers recording information about you and your loved ones. It's worth reading as it breaks down many common ways users are tracked online in easy-to-read, easy-to-identify sections. Beyond just describing the father's trip to the park, there are also side notes and a FAQ at the end that aim to help people who are not well versed in tech or advertising language understand where their data is going and how. they could control them. that. The rep...
Business, Canada, Privacy & Cloud, Security

What EB Games Canada’s PS5 Privacy Breach Could Mean to Customers

In the US, video game retailer GameStop has been a trending topic on the internet for its actions. increasing significantly due to Reddit. However, GameStop's Canadian division, EB Games, has been the subject of an entirely different controversy. On Tuesday, January 26, the retailer restocked the PlayStation 5 in Canada, a routine activity since November, as the system repeatedly depletes within minutes. However, upon completion of the purchase, several customers began to notice something peculiar: EB Games Canada's website displayed the personal information of other customers. This information included names, phone numbers and addresses, although the credit card details appear to be safe. Following these reports, MobileSyrup contacted EB Games Canada several times, but no respons...
Business, Facebook, Privacy & Cloud, Security

Facebook users’ phone numbers are sold through Telegram’s automated bot

Access to a database that allegedly contains phone numbers belonging to Facebook users is sold on a cybercrime forum. Motherboard reports that although the data is old, it still poses a privacy risk. The person running the bot claims that the database contains the phone numbers of more than 500 million Facebook users. The social media giant has said the data relates to a vulnerability that it patched in August 2019. The database can allow people to look up those numbers using an automated Telegram bot, according to Alon Gal, the security researcher who found the vulnerability. Technical skill is required to find information from these types of databases, but creating a Telegram bot that can find data makes it easier for bad act...
Business, Privacy & Cloud, Security

CRTC launches consultation on proposed framework to address botnets

The Canadian Radio, Television and Telecommunications Commission (CRTC) has launched a query on his proposed framework for addressing botnets. Botnets are essentially harmful networks of malware-infected computers that are under the control of a malicious actor. "The commission seeks comments on the suitability and need for telecommunications service providers to adopt blocking techniques within their networks, including the safeguards that would be necessary to ensure privacy, transparency and effectiveness," says the CRTC. Botnets can facilitate harmful cyberattacks, including ransomware and identity theft. The CRTC notes that these attacks cause damage to critical organizations such as hospitals, schools and government agenci...
Business, microsoft, Privacy & Cloud, Security

Microsoft Says SolarWinds Hackers Could See Some of Your Source Code

Microsoft says the hackers at SolarWinds were able to view some of the company's source code. The news comes as Microsoft continues to investigate the massive SolarWinds attack, in which hackers corrupted downloads of data management software called SolarWinds. The move resulted in the installation of malicious code at various US government agencies and technology companies, which malicious code may have allowed hackers to monitor operations for up to nine months before being detected. It is worth noting that the Canadian government says that despite using SolarWinds products in various government agencies and departments, did not find any compromised security related to the attack. In a update shared by Microsoft Security Response Center, the company explained that it discovered t...
Apple, iPhone, News, Phones, Security

Apple ships special, more open iPhones to security researchers

Apple recently announced 'Apple Security Research Devices Program'is now sending special investigative iPhones to security investigators. In July, Apple announced the program, which will provide specialty iPhones equipped with single-code execution and containment policies. These devices will help security researchers look for vulnerabilities in software and hardware. IPhones are less locked than devices sold to consumers, but they are as close to production phones as possible. Also, special devices will not require investigators to jailbreak to investigate. The program comes after several vulnerabilities were found in iOS last year, including iMessage security issues that did not require user interaction and five exploits that ...
Apps & Games, Facebook, News, Security

Facebook Plans to Add More Security Features to Account Next Year: Report

Facebook has plans to add more security features to the account in 2021, according to a new report Reuters. The social media giant will begin allowing users to set up physical security keys to verify their identity before logging into the Facebook app. Currently, users have the option to request a hardware security key when logging into the desktop platform. Facebook users will have the option to buy a hardware key from retailers and then register it with the social media giant. The platform also has plans to expand its 'Facebook Protect' security program globally to more types of accounts next year. The service is currently used for high-profile accounts in the United States, such as election candidates. Basically, it allows pol...
Business, Facebook, Google, microsoft, Privacy & Cloud, Security

Microsoft and Google back Facebook’s legal action against spyware company

A group of tech giants, including Microsoft, Google and Cisco, have backed Facebook's legal action against spyware company NSO Group. WhatsApp, owned by Facebook, sued the NSO Group last year, claiming that the company's software was used to hack 1,400 devices through a vulnerability in its service. NSO Group had argued that it should receive sovereign immunity, as its services are sold to federal governments and are aimed at having the lawsuit set aside. However, a judge denied the request to dismiss the lawsuit. The spyware company is now taking legal action to overturn the ruling, which is what Microsoft and the other tech giant are taking action against. Other companies featured in the presentation include the Internet and ...
Business, Privacy & Cloud, Security

Privacy watchdog says ‘series of loopholes’ in safeguards caused Desjardins breach

The Canadian Privacy Commissioner has determined that Desjardins' data breach was caused by a number of breaches in safeguards. The incident took place in June 2019 after an employee leaked names, addresses, social security numbers, email addresses, dates of birth, and data on users' transaction habits. Privacy Commissioner Daniel Therrien has concluded that Desjardins did not properly implement its policies for managing personal information and that the segregation of data from its databases was inadequate.Therrien also found that employee training was lacking and that Desjardins failed to implement retention periods regarding the destruction of personal information. "Desjardins failed to demonstrate the appropriate level of car...
Business, Privacy & Cloud, Security

Canada’s Top Cybersecurity Agency Names Four Countries As ‘Greatest Strategic Threats’

The Canadian Center for Cyber ​​Security has revealed that state-sponsored programs in China, Russia, Iran, and North Korea pose the greatest strategic threats. In its last annual report, the agency revealed that state sponsorship is generally the most sophisticated threat to Canadians. State-sponsored threat actors are motivated by economic, ideological, and geopolitical objectives. Its activities include cyber espionage, intellectual property theft, online influence operations and disruptive cyber attacks. Actors are likely to try to develop cyber capabilities to disrupt critical infrastructure, such as electricity supplies, to further their goals, according to the report. "We consider it highly unlikely, however, that cyber threat actors will intentionally seek to disrupt Canadi...
Facebook6k
Twitter20
LinkedIn890
Telegram20
WhatsApp432