security Stories July 14

GOOG: 955.99

8.83

U.S. Border Protection can search devices but not cloud accounts, as searches climb dramatically

U.S. Customs and Border Protection has advised a Senator that while it has the power to search electronic devices and examine all data stored on them, these powers do not extend to searching data stored in the cloud …

security Stories July 6

GOOG: 906.69

-5.02

Cabin baggage ban on laptops & tablets over in all but name after latest exemption

The ban on laptops and tablets in cabin baggage on certain flights into the USA is over in all but name as a fourth airline is exempted. It’s clear by this stage that the ban was simply an aggressive way to force airports and airlines to adopt tougher security screening measures.

security Stories May 31

GOOG: 964.86

-11.02

It’s been more than two months since the U.S. government banned tablets and laptops from cabin baggage on flights from 10 airports, and there has been much talk since of extending the ban.

An iPad bomb plot was said to have been one factor behind the original ban. The Trump administration last month considered extending the ban to all flights from Europe, with the plan said to be ‘under active consideration‘ before it was reportedly rejected.

Now, however, it appears that an even more widespread ban is on the table …

expand full story

security Stories May 26

GOOG: 971.47

1.93

A set of Android vulnerabilities discovered by security researchers would allow an attacker complete control of a device, when locked and the screen is switched off.

The image above illustrates just one attack vector, clickjacking – where the user thinks they are okaying one thing while invisibly okaying something else. For illustrative purposes, the researchers have made the real action visible behind the overlay, but in real use (seen in the video below) the permission box would be invisible to the user …

expand full story

Everyone can use an Echo Dot: Just $50!

security Stories May 24

GOOG: 954.96

6.14

PSA: Many major media players vulnerable to attack via malicious subtitles files [Video]

Security researchers have discovered a surprising new way for attackers to gain control of a machine: malicious subtitles. The vulnerability is device-independent, meaning it could be used to gain control of anything from a smartphone to a PC or Mac.

security Stories May 12

GOOG: 932.22

1.62

According to Google, last week’s phishing scam that imitated a Docs invite was quickly countered by existing security measures. The company is now announcing changes aimed at developers to prevent future attacks.

expand full story

Powered by WordPress.com VIP