Bluetooth beacons: one free privacy debate with your next order

Credit to Author: Christopher Boyd| Date: Tue, 30 Jun 2020 15:00:00 +0000

We take a look at Bluetooth beacons and their role behind the scenes in many real-world marketing campaigns—whether you’re aware of it or not.

Categories:

Tags:

(Read more…)

The post Bluetooth beacons: one free privacy debate with your next order appeared first on Malwarebytes Labs.

Read more

Risk Decisions in an Imperfect World

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 30 Jun 2020 12:57:58 +0000

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…

The post Risk Decisions in an Imperfect World appeared first on .

Read more

BHIM App attacked! Secure your online banking today with Quick Heal

Credit to Author: Akuti Ojah| Date: Thu, 25 Jun 2020 06:41:32 +0000

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app…

Read more

Facial recognition: tech giants take a step back

Credit to Author: Pieter Arntz| Date: Thu, 18 Jun 2020 15:30:00 +0000

Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law.

Categories:

Tags:

(Read more…)

The post Facial recognition: tech giants take a step back appeared first on Malwarebytes Labs.

Read more