The Proliferation of Cellular in IoT

Analysis of Cellular Based Internet of Things (IoT) Technology is a new whitepaper co-authored by Rapid7 principal security researcher Deral Heiland and Thermo Fisher Scientific lead product security researcher Carlota Bindner. In this new research, the authors dive deep into Read More …

US senators ask FTC to investigate car makers’ privacy practices

An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast scale, and that the same car makers often obtain consumer consent through deception. Based on Read More …

UK: King Charles military badge rollout delayed over fears China could ‘use them for spying’

The introduction of military badges specially redesigned to mark King Charles’s accession to the throne has been delayed, with claims British Army chiefs fear the insignia could be made in China, enabling Beijing to insert tracking devices into them. Regiments Read More …

The Illusion Of Privacy: Geolocation Risks In Modern Dating Apps

Dating apps traditionally utilize location data, offering the opportunity to connect with people nearby, and enhancing the chances of real-life meetings. Some apps can also display the distance of the user to other users. This feature is quite useful for Read More …

EASA Partners with IATA to Counter Safety Threat from GNSS Spoofing & Jamming

Cologne – The European Union Aviation Safety Agency (EASA) and the International Air Transport Association (IATA) announced the conclusions of a workshop jointly hosted at EASA’s headquarters to combat incidents of GNSS spoofing and jamming. The workshop’s high-level conclusion was Read More …

China: Foreign geographic information software collects sensitive data, posing threat to national security

China’s national security agencies have discovered that foreign geographic information system software used in important industries in China has been collecting and transmitting geographic information data with some of the information collected involving state secrets, posing a serious threat to Read More …

Europol warning on the criminal use of Bluetooth trackers for geolocalisation

For the past several years, Europol has been observing a growing crime phenomenon: the use of Bluetooth trackers in organised crime. Bluetooth trackers are small devices designed to help people find personal objects, such as keys and bags, as well Read More …

The outstanding stealth of Operation Triangulation

In the previous blogpost on Triangulation, Kaspersky researchers discussed the details of TriangleDB, the main implant used in this campaign, its C2 protocol and the commands it can receive. The researchers mentioned, among other things, that it is able to Read More …

23andMe user data breached in credential-stuffing attack

Biotech company 23andMe, known for its DNA testing kits, said the leak occurred through a credential-stuffing attack. A credential-stuffing attack involves user information that has already been compromised (usernames and passwords, for example) from one organization, which a hacker obtains Read More …

FBI was using advanced hacking software despite White House ban

Since November of 2021, US-based companies have been barred from doing business with the NSO Group, an Israeli research firm behind some of the most advanced hacking tools the tech world has ever seen. Come to find out, a New Read More …