Location

Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit
Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame ...
Security Boulevard

Deepfake Fraud, Data Brokers Tracking Military Personnel
Tom Eston | | biometrics, Cyber Security, cyber threat, Cybersecurity, Data Brokers, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Fraud, Germany, Information Security, Infosec, Location, location data, military, pirates, Podcast, Podcasts, Privacy, Privateers, Scams, security, Strava, surveillance, technology, Weekly Edition
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...

Temu is Malware — It Sells Your Info, Accuses Ark. AG
Richi Jennings | | breach of privacy, china, china espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, customer location, geofencing and location tracking, geolocation, Location, location access permission, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location services, location sharing location tracking, PDD Holdings, Pinduoduo, Privacy, SB Blogwatch, Temu, Whaleco
Chinese fast-fashion-cum-junk retailer “is a data-theft business.” ...
Security Boulevard

Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk
Richi Jennings | | access management, ASX:360, Chris Hulls, content scraping, data scraping, enumeration, Enumeration Attacks, Ex-Employee Credentials, geofencing and location tracking, geolocation, Identity & Access Management, identity and access management, Identity and Access Management (IAM), Life360, Location, location data, Location data privacy, location finder app, location history, location intelligence, location privacy, location sharing location tracking, preventing possible attempt to enumerate users, SB Blogwatch, scraper, Scrapers, Scraping, Tile, user enumeration
Location tracking service leaks PII, because—incompetence? Seems almost TOO easy ...
Security Boulevard

Apple API Allows Wi-Fi AP Location Tracking
Richi Jennings | | Apple, apple bug, customer location, geofencing and location tracking, geolocation, GPS location, Location, location access risks, location data, Location data privacy, location privacy, location services, location sharing location tracking, SB Blogwatch, Skyhook, Starlink, Tibro, Wi-Fi, wi-fi security
Privacy FAIL: Apple location service returns far more data than it should—to people who have no business knowing it—and without your permission ...
Security Boulevard

FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard

Shady Tracking Firms Are Selling Your GPS Location History
Richi Jennings | | Cybersecurity, GPS, Information Security, Location, Privacy, SB Blogwatch, security
In a worrying report, the Gray Lady is waking up Americans to the silent world of smartphone location tracking and brokerage ...
Security Boulevard

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Richi Jennings | | Apple, Cybersecurity, Information Security, iPhone 11, Location, Privacy, SB Blogwatch, security, Security News
Why is Apple so bad at answering simple questions? ...
Security Boulevard

Malware Misuses Common Operating System Commands to Perform Targeted Attacks
Joe Darbyshire | | country, Location, Malware, OS language, region, Targeted Attack, threats, Ursnif
We previously posted a blog about the Ursnif family of malware using language checks to determine the end user’s location as a means of bypassing sandbox-based endpoint protection during regionally targeted attacks ...

Location-Aware Malware Targets Japanese and Korean Endpoints
Joe Darbyshire | | DateAndTime, excel, image, Japan, Korea, Location, Malware, Microsoft, threats, ZeRo
New malware samples use location awareness to specifically target Japanese and Korean endpoints. The malware uses two techniques to determine the location in which it is being executed and ensures that the ...