‘Supercookies’ Have Privacy Experts Sounding the Alarm

Credit to Author: Chris Stokel-Walker| Date: Tue, 28 Jun 2022 16:05:21 +0000
A German ad-tech trial features what Vodafone calls “digital tokens.” Should you be worried?
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Chris Stokel-Walker| Date: Tue, 28 Jun 2022 16:05:21 +0000
A German ad-tech trial features what Vodafone calls “digital tokens.” Should you be worried?
Read More
Credit to Author: Jonny Evans| Date: Tue, 28 Jun 2022 07:59:00 -0700
Among a slew of announcements at WWDC this year were some important changes to Apple’s support for single sign-on (SSO). Here’s what’s coming when new updates ship this fall.
Apple first introduced SSO support at WWDC 2019 with Sign in with Apple, which also saw the introduction of extensions to enable this kind of authentication. It allowed a user to access a service or website using their Apple ID, and meant support for identity providers, the use of highly secure token-based signatures and the tools service providers required to implement these systems.

Credit to Author: Reece Rogers| Date: Mon, 27 Jun 2022 11:00:00 +0000
If you use a mix of Apple, Android, and Windows gadgets, you’re in luck: The security tool is now available to any Microsoft 365 subscriber.
Read More
Credit to Author: Susan Bradley| Date: Mon, 27 Jun 2022 09:24:00 -0700
We’ve reached the mid-point of 2022 and when it comes to security, I feel like we’re not making much headway. I still see people report they’re getting scammed, ransomed, and attacked on a regular basis — and for many users the browser is becoming the most important part of whatever platform you use. So now is a good time to review your browsers, and any extensions you’ve installed to beef up security.
Note, I said browsers —plural. While enterprises might want to standardize on only one browser for better control, for small businesses and individual users, I recommend installing more than one. (I often use three different browsers.)
Why is this important? Because attackers (and trackers) go after browsers. In fact, it’s good to think of your browser a separate operating system, and act accordingly to protect it. Though I focus mainly on Windows issues, these guidelines and recommendations apply to Mac OS, Ubunto, Mint, and others.

Credit to Author: Andrew Couts| Date: Sat, 25 Jun 2022 13:00:00 +0000
Plus: Microsoft details Russia’s Ukraine hacking campaign, Meta’s election integrity efforts dwindle, and more.
Read More
Credit to Author: Matt Burgess| Date: Sat, 25 Jun 2022 11:00:00 +0000
It’s never been easier to switch between iPhone and Android—and to get your messages out of the Meta ecosystem entirely.
Read More
Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700
Here we go again: another example of government surveillance involving smartphones from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there’s justification for keeping mobile platforms utterly locked down.
I don’t intend to focus too much on the news, but in brief it is as follows:
The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.

Credit to Author: Lily Hay Newman| Date: Thu, 23 Jun 2022 17:30:32 +0000
The spyware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.
Read More