Distributing hacked versions of popular apps
Software distributors such as TutuApp, Panda Helper, AppValley and TweakBox have found a simple way to distribute pirated iPhone apps without using Apple’s app store.
Will spend 1.5 billion pounds to keep the Brits happy
The Chinese technology giant Huawei has said security problems raised in a government report could take between three and five years to fix.
Ignored it for a more than a week
Fruity cargo cult Apple knew about a killer bug on its iPhone software which allowed users to listen into their mates’ conversations for a week before it pulled the software.
Best before expired
Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs.
Google will shut down its Google+ social media service in April, four months ahead of schedule, after finding a software flaw for the second time this year that allowed partner apps to access its users’ private data.
Attempt to kill third-party repairs
The Tame Apple Press has made much ado about the fruity cargo cult Apple’s super cool game-changing T2 security chip which is supposed to make Macs like Fort Knox. But according to the Verge, the T2 chip is a nasty bit of DRM whose main job is to lock down Apple devices from third-party repair services.
Chrome now uploads all your browser history
In previous versions of Chrome, you could visit Gmail, YouTube or other Google websites and log into them without Chrome automatically uploading all of your browsing histories to Google but "fortunately" Google has seen fit to correct this flaw.
US Homeland Security has found evidence that Russian hackers have broken into supposedly secure, "air-gapped" or isolated networks owned by utilities.
Things are going to get worse
Analyst outfit Gartner has warned that two thirds of companies do not have the in house staff able to deal with security issues.
Taking out the satellites
Insecurity experts Symantec have uncovered a sophisticated hacking campaign launched from computers in China burrowed deeply into satellite operators, defence contractors and telecommunications companies in the United States and southeast Asia.