Cyber Defense Advisors

News

Security Vulnerabilities in Eufy Cameras

Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The company’s behavior is so egregious that ReviewGeek is no longer recommending them. This will be interesting to watch. If Eufy can ignore security researchers and the press […]

Cyber News, Cyber Threat Trends

Security Vulnerabilities in Eufy Cameras

Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The company’s behavior is so egregious that ReviewGeek is no longer recommending them. This will be interesting to watch. If Eufy can ignore security researchers and the press […]

Cyber News, Cyber Threat Trends

Government to Fund Security Studies for Hundreds of Students

Latest move shows urgent need to nurture skills pipeline

Cyber News, Cyber Threat Trends

Government to Fund Security Studies for Hundreds of Students

Latest move shows urgent need to nurture skills pipeline

Cyber News, Cyber Threat Trends

Government to Fund Security Studies for Hundreds of Students

Latest move shows urgent need to nurture skills pipeline

Cyber News, Cyber Threat Trends

Security Concerns Scupper Deals for Two-Thirds of Firms

Global report ties poor security to bottom-line impact

Cyber News, Cyber Threat Trends

Security Concerns Scupper Deals for Two-Thirds of Firms

Global report ties poor security to bottom-line impact

Cyber News, Cyber Threat Trends

US Sues TikTok Over Child Safety and Data Security Claims

The Indiana court said TikTok promoted age-restricted content regardless of a user’s age

Cyber News, Cyber Threat Trends
  • by
  • December 9, 2022

New Ransom Payment Schemes Target Executives, Telemedicine

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the “patient.” The other involves carefully editing email inboxes […]

Cyber News, Cyber Threat Trends