COVID-19 tracking apps are easy targets for hackers

In their haste to bring COVID-19 contact tracing apps to market, many developers around the world have skimped on security, giving hackers easy targets from which they can steal all kinds www.mcafee.com/activate of sensitive information, such as the names of the sick, national ID numbers www.mcafee.com/activate download, location data www.mcafee/activate, and more. Countries have been deploying the tracking apps in an effort to identify disease hotspots and limit the www.mcafee.com/activate product key spread of the virus while they ease lockdown orders. Qatar, India, the U.K., and the Netherlands are just some of the nations who learned their tracking apps had security flaws only after they’d been put into use mcafee.com/activate product key. 

The U.S. is just starting to use contact tracing apps, but instead of deploying one national app, each state must create their own. Working with low cybersecurity budgets, states are beginning to do just that but with mixed results. Politico reported that public debate centers on the question of who should have access to the collected information. The constant revelations of weak cybersecurity is only exacerbating the problem. Shortly after North Dakota released its Care19 contact tracing app, it was discovered www.mcafee.com/activate that user location data was being shared with marketing service Foursquare. Members of Congress have started submitting bills focused on app legislation, covering data security and privacy, but this deeply divisive topic is still in its nascent stages on Capitol Hill. 

Avast security evangelist Luis Corrons feels that new app laws are beside the point. “The solution is already here,” Corrons said, “and there is no need for extra legislation www.mcafee.com/activate download. The success of these apps relies on the people using them.” As for the right software to use, Corrons points to the joint www.mcafee/activate venture between two tech giants. “Apple and Google worked together to create an API that can create contact tracing apps. It requires user consent, works with Bluetooth, is anonymous, and does not store personal information www.mcafee.com/activate product key on any server, protecting user privacy all the time. And it works for both Android and iOS.” It remains to be seen mcafee.com/activate product key  whether or not any of the states’ will put the Apple-Google API to use. 

This week’s stat

53

The number of countries that will soon www.mcafee.com/activate be required to secure connected vehicles against cyberattacks under  a new United nation regulation

TikTok iPhone app reads your clipboard

As security researchers were beta testing Apple’s iOS 14, they learned that the popular Chinese social media app TikTok can see whatever is saved on the user’s clipboard, that system-wide temporary holding location for any files that are cut and pasted. According toComputing, the researchers learned about the app’s secret spying due to a new security protocol in the upcoming iOS 14 that notifies users when any app accesses the clipboard www.mcafee/activate. Earlier this year, researchers www.mcafee.com/activate download discovered that TikTok accessed the clipboard on Android devices, which the app developer claimed was unintentional and a mistake, a statement that now seems dubious mcafee.com/activate product key. Some organizations such as the U.S. military has banned the use of the app, categorizing it as a security threat.

Tech giants protest new anti-privacy law in Hong Kong

New legislation in Hong Kong is being seen as a measure  www.mcafee.com/activate product key to intimidate free speech, and in protest some of the largest online entities www.mcafee.com/activate have banded together in unity to stop processing data requests from the Special Administrative Region (SAR) of China. The companies WhatsApp, Telegram, Facebook, Twitter, LinkedIn, and Zoom have all suspended cooperation with Hong Kong police until an international www.mcafee.com/activate download consensus on how mcafee.com/activate product key to react has been reached. According to infosecurity the vaguely-worded new law gives Chinese authorities the power to punish acts of “terrorist activities” and “subversion” with life imprisonment or death, as well as the right to search the premises of any property without a warrant. 

This week’s quote

"Details exposed from one breach could be re-used to compromise accounts used elsewhere. The message is simple – consumers should use different passwords for every account, and organizations  www.mcafee.com/activate should stay ahead www.mcafee/activate of the criminals by tracking where the details of their employees and customers could be compromised,” warns Rick Holland, CISO at Digital Shadows, in relation to securing users against breached credentials. 

Major card skimming scheme linked to North Korean hackers

Researchers believe the North Korean nation-state Lazarus group, also known as Hidden Cobra, is most www.mcafee.com/activate product key likely the source of a wide-reaching credit card skimming scheme that has been going on for at least a year. Bleeping computer reported  mcafee.com/activate product key that the code and domains associated with www.mcafee/activate the scheme come straight from Hidden Cobra’s playbook, though it hasn’t been confirmed that www.mcafee.com/activate download the hacking group orchestrated  www.mcafee.com/activate the plan. The victimized online shops where the skimming malware was planted include Claires, Wongs Jewellers, Focus Camera, Paper Source, Jit Truck Parts, CBD Armour, and many others.  

Comments

Popular posts from this blog

Introducing tracking prevention, now available in Microsoft Edge preview builds

Why businesses need to back up

Hackers and their motives