Instagram Data Exposure
Posted May 21, 2019
In the News Just how public is the information used on social media platforms? In Millions of Instagram influencers had their private contact data scraped...Posted May 21, 2019
In the News Just how public is the information used on social media platforms? In Millions of Instagram influencers had their private contact data scraped...Posted May 20, 2019
In the News Do you know how much data is stored in your Gmail email account? In Google has been tracking nearly everything you buy...Posted May 16, 2019
In the News Another cellular carrier has been hit with a data breach. In Boost Mobile Alerts Customers of Security Incident, Kacy Zurkus at InfoSecurity Magazine discusses Boost Mobile’s response to suspicious...Posted May 16, 2019
In the News In “Wormable” Bug Could Enable Another WannaCry, Phil Muncaster at InfoSecurity Magazine discusses Microsoft’s most recent patch class including many critical flaw patches. Muncaster stresses the fact that the flaws...Posted May 10, 2019
In the News Are claims all they are cracked up to be? In ‘Unhackable’ Biometric USB Offers Up Passwords in Plain Text, Tara Seals at ThreatPost discusses a new...Posted May 9, 2019
In the News Ad Tacking is getting a big switch-up. In Google is pushing back against ad tracking in Chrome, Russel Brandom at The Verge discusses...Posted May 8, 2019
In the News App updating gets a new feature on Android devices. In Android developers can now force app updates, Frederic Lardinois discusses the rollout of forced updates...Posted May 7, 2019
In the News Your private social media posts really are not private at all. In Facebook’s contract workers are looking at your private posts to...Posted May 7, 2019
In the News Free-Movie downloads and false promises. In Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting, Tara Seals at Threatpost discusses free movie download scams designed to steal...Posted May 3, 2019
In the News Flaws in the supply chain process threaten security. In Most Firms Rely on Trust Alone for Supply Chain Security, Phil Muncaster at InfoSecurity Magazine discusses an...