Cybersecurity graphic

Ring Rolls Out End-To-End Encryption For Surveillance Footage

Ring has gotten negative press coverage recently for accessing customers’ Ring camera footage. Now they’re implementing end-to-end encryption. End-to-end encryption has become known as a far more sound alternative to conventional encryption. This is because conventional back-doored encryption enables the service provider to access your data whether customers like it or not. End-to-end encryption provides…

Eye on computer chip

Apple Blocks Apps From Circumventing Customers’ Anti-Tracking Settings

Apple has reportedly caught some app vendors trying to circumvent customers’ anti-tracking settings via a tracking system called CAID. Apple blocked updates that implemented CAID. CAID is an system that allows participating app vendors to track users’ activity across apps, even if they declined permission to be tracked on their iPhones. It was introduced by…

Two iPhones

Apple Warns Of Devices You Must Keep Away From Your Pacemaker

There has been a growing trend towards slick magnetic devices that make it easier to charge or wake your devices, such as Magsafe, open-to-wake on tablets, and wireless charging pads. Apple is warning users of pacemakers to keep certain devices a ‘safe distance’ from their pacemakers to avoid complications. The issue pertains to devices containing…

Windows 10 on a phone and laptop.

Microsoft Accidentally Signs Malware-Infected Driver

Microsoft has accidentally signed a driver called Netfilter, which contains malware and is distributed within gaming environments. Cybersecurity researchers have been tracing the malware and its activities and found that it communicates with Chinese command and control (C2) IP addresses. That type of malware is called a rootkit, which means that it is programmed to…

Mercedes-Benz Breach Exposes SSNs, Credit Card Numbers, And Birth Dates

A Mercedes-Benz data breach exposed sensitive information owned by their customers. 1.6 million customer records were audited and the breach was found to affect fewer than 1,000 customers. The information in the breach included drivers license numbers, social security numbers, self-reported customer credit scores, credit card numbers, and dates of birth. The German automaker disclosed…

Smartphone with a lock and key on it

Phone Numbers Need To Be Phased Out

Telephones were invented more than a century ago, before the Internet existed. They provided a quick and easy way to communicate with friends, family, and acquaintances in a somewhat affordable manner. As high-speed, unmetered Internet connections become more ubiquitous, they have resulted in the mainstream adoption of calling and instant messaging services that vastly outperform…

iPhone 4S

iOS 12.5.4 Security Update Released For iPhones 7+ Years Old

Apple is rolling out the iOS 12.5.4 update for older iPhones, iPads, and iPods including but not limited to the iPhone 5s, iPhone 6, 6th generation iPod Touch among others. It is a security update that addresses memory corruption and arbitrary code execution (ACE) vulnerabilities. It addresses the following vulnerabilities: CVE-2021-30737 The update addresses WebKit…

Super Mario Run being played on an iPhone 7

iOS Should Have A Permissions Screen

Apple has been leading the pack on user privacy for smartphones and tablets for years, and App Tracking Transparency (ATT) in iOS 14.5 is one of the most prominent examples of that so far. Despite offering a significantly higher security and privacy standard than Android, iOS users would still benefit from having a permissions screen.…