Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources

bitcoin

A week in security (July 1 – 7)

26th July 201926th July 2019 peterglock

Last week on Malwarebytes Labs, we explained what to do when you find stalkerware, how cooperating apps and automatic permissions are setting you up for failure, and why you should […]

 a week in security, Be Aware, bitcoin, bitcoin generators, cash generators, China, Equifax, Germany, godlua, ironpython, Malwarebytes, openpgp, permissions, ryuk, smart home, stalkerware  Glock Takes Stock

Recent Posts

  • ENISA launches security mapping tool
  • 7 in 10 Cameras Are Running Outdated Firmware
  • Cyber security takes its place alongside UK’s armed services
  • Smith & Wesson targeted in cyberattack, report says
  • Apple Explains Mysterious iPhone 11 Location Requests

    Archives

    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019

    Categories

    • 101
    • 2fa
    • a week in security
    • AB 846
    • AB 873
    • adware
    • AdwCleaner
    • agent smith
    • Akamai
    • ALICE
    • Amazon
    • Amazon Elastic Compute Cloud
    • amazon prime
    • amazon prime day 2019
    • amazon prime phishing
    • Amazon web services
    • Amazong
    • Android
    • android malware
    • android Q beta
    • AndroidQ
    • antitrust
    • anunak
    • app permissions
    • Apple
    • apps
    • Ars Technica
    • Articles
    • Artificial Intelligence
    • assistance fraud
    • AT&T
    • atm attacks
    • atm cash-out attacks
    • atm fraud
    • atm malware
    • Automation
    • Awareness
    • aws
    • Baby Boomers
    • backdoor
    • Banking
    • banking phish
    • barnaby jack
    • Be Aware
    • Beta
    • Big Data
    • biometrics
    • bitcoin
    • bitcoin generators
    • Biz & IT
    • black box attacks
    • blog series
    • BlueKeep
    • Brave
    • Brave browser
    • Breach
    • Brian Krebs
    • british airways
    • Bruce Schneier
    • bugs
    • bundler
    • bundleware
    • Business
    • c-level
    • c-suites
    • c0decalc
    • California Consumer Privacy Act
    • call detail records
    • Cambridge Analytica
    • Capital One
    • Capital One data breach
    • Capital One hack
    • carbanak
    • Carbon Black
    • cash generators
    • Cellular
    • China
    • China Chopper
    • chrome
    • CIOs
    • CISO
    • CISOs
    • Cloud security
    • Cloudflare
    • CNBC Technology
    • CNET
    • code injection
    • compromise
    • Cookies
    • credential stuffing
    • credit monitoring
    • crowdstrike
    • CSOs
    • cutlet maker
    • Cyber Attack
    • Cyber Insurance
    • Cyberattacks
    • Cyberlaw
    • cybersecurity
    • daniel regalado
    • Dark Reading
    • Darkode
    • data
    • data at rest
    • data breach
    • data breach settlement
    • Data breaches
    • Data Broker
    • data in transit
    • data leaks
    • Data privacy
    • data privacy laws
    • data privacy legislation
    • data protection
    • Data Security
    • Data Security and Privacy Insider
    • data-loss
    • ddos
    • Deception
    • def con
    • defrauding the elderly
    • Department of Homeland Security
    • Deutsche Welle
    • developer's corner
    • development
    • digital bill of rights
    • Digital Business
    • Disconnect
    • distraction fraud
    • DNS
    • DNS servers
    • DNS-changer
    • domain controller
    • doordash
    • drive by
    • drop box
    • DuckDuckGo
    • ease-of-use
    • eavesdropping
    • EC2
    • EDR platforms
    • EFF
    • EK
    • EKs
    • Elasticsearch
    • electron
    • Electronic Frontier Foundation
    • Electronic Privacy Information Center
    • elizabeth warren
    • email
    • emotet
    • encryption
    • end to end encryption
    • enterprise
    • Equifax
    • Equifax breach
    • eris
    • EU
    • european union
    • Events
    • exes
    • exploit kit
    • exploit kits
    • exploits
    • Extenbro
    • extension
    • extensions for financial services
    • FaceApp
    • Facebook
    • Facial Recognition
    • Fallout
    • family IT guy
    • FBI
    • federal data privacy law
    • federal data privacy legislation
    • Federal Trade Commission
    • fintech
    • Flight 17
    • fraud
    • fraud prevention
    • FTC
    • funding cybersecurity
    • Gaming & Culture
    • gate
    • GDPR
    • General Data Protection Regulation
    • generation X
    • Germany
    • Ghostery
    • Glock Takes Stock
    • godlua
    • google
    • Google Chrome
    • google home audio
    • government cybersecurity
    • Graham Cluely
    • greendispenser
    • GreenFlash Sundown
    • hack
    • hacking
    • health care
    • HHS
    • Hospitals
    • iam
    • IBM
    • ICO
    • identity access management
    • identity theft
    • incident response
    • India
    • Information Security
    • infosec
    • internet service provider
    • intuitive tech
    • Investment
    • IoT
    • iPhone
    • ironpython
    • IT Governance
    • jackpotting
    • jailbreak
    • JD Supra
    • JPEG
    • Kaspersky
    • kill chain
    • Krebs on Security
    • LastPass
    • lavabit
    • law enforcement
    • lawfare
    • lazarus group
    • local government
    • logical attacks
    • login credentials
    • Lord EK
    • Mac
    • MacOS
    • Magecart
    • Magento
    • Magnitude
    • Maine
    • Malaysian Airlines
    • malicious domains
    • malicious IPs
    • malicious websites
    • malvertising
    • malware
    • malware removal
    • malware-based attack
    • Malwarebytes
    • marcus hutchins
    • Mark Zuckerberg
    • metropolitan police
    • microsoft
    • mirai
    • Mobile
    • mobile menace monday
    • mobile security
    • motherboard
    • municipalities
    • nation-state attack
    • network world
    • News
    • Nexus
    • njRAT
    • office 365
    • older users
    • online privacy
    • openpgp
    • operation soft cell
    • Opinion
    • opsec
    • padpin
    • Paige Thompson
    • pale moon
    • parental monitoring
    • parental monitoring apps
    • passwords
    • patching
    • payment
    • Penetration testing
    • penetration testing tools
    • permissions
    • personal information
    • personally identifiable information
    • phishing
    • Phobos
    • PII
    • ploutus
    • plugins
    • Poison Ivy
    • police
    • Policy
    • PoliticoEU
    • pre-installed software
    • preempt
    • preemption
    • privacy
    • project zero
    • propublica
    • protonmail
    • Purism
    • Pwnie Express
    • QR Code
    • QR code scam
    • ransomware
    • RATs
    • regulation
    • remediation and prevention
    • reports
    • Research
    • Researcher's corner
    • Resource
    • RIG
    • right to access
    • Ring doorbell
    • robocalls
    • Root certificate
    • roundup
    • router
    • rules-based segmentation
    • Russia
    • russian disinformation
    • ryuk
    • Salesforce
    • scam
    • scams
    • scheduled tasks
    • Science
    • sdelete
    • secure delete
    • secure messaging
    • Security
    • security breach
    • security engineering
    • security executives
    • security solutions
    • security tools
    • Sen. Ron Wyden
    • settlement
    • shoe shine
    • shoulder surfing
    • Signal
    • sim swap
    • skimmer
    • skimmers
    • skype
    • slack
    • smart home
    • smart phones
    • smart TV
    • SMS
    • sniffer
    • Social engineering
    • social engineering attacks
    • social media
    • social purpose company
    • social security numbers
    • software liability
    • Spelevo
    • SpyEye
    • stalkerware
    • stimulator
    • stuxnet
    • suceful
    • Supply Chain
    • surveillance
    • survey
    • SWATting
    • targeted spear phishing
    • tax
    • Tech
    • Tech Republic
    • Technology
    • The Telegraph
    • Threat analysis
    • threat intelligence
    • Threatpost
    • trade
    • travel
    • travelling
    • trickbot
    • trojan
    • trojans
    • TrustWave
    • twitter
    • tyupkin
    • Uncategorised
    • Underminer
    • updates
    • url
    • US data privacy laws
    • US data privacy legislation
    • US Federal Trade Commission
    • US Senate Judiciary Committee
    • usenix
    • Vermont
    • virustotal
    • Vivaldi
    • VPN servers
    • VT
    • vulnerabilities
    • vulnerability
    • wannacry
    • wardriving
    • web skimmers
    • web threat
    • Web threats
    • Week in security
    • Whaling
    • WhatsApp
    • Wiper
    • wire
    • Wired
    • X-Force Red
    • xfs middleware
    • ZDNET
    • zero days
    • Zeus
    • zoom zero-day

    Get in touch

    Email: [email protected]


    View Glock Enterprises Ltd profile on Ariba Discovery

    Pages

    • Blog
    • Privacy Policy
    • Resources
      • White Paper: Building a Business Case for Cybersecurity Asset Management
      • White Paper: Internet Connected Storage
      • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
      • Whitepaper: Coping with a flood of Data Subject Access Requests
      • Whitepaper: Cyber Deception
    • Services
    • Welcome

    The Latest from Facebook

    Glock Enterprises Ltd

    2 months ago

    Glock Enterprises Ltd

    If you fancy 30 minutes of watching a bald guy talk about the 5 questions you need to ask... youtu.be/bpZI9EoFt5E ... See MoreSee Less

    CyberChess 2019

    youtu.be

    My presentation at Cyberchess 2019 in Riga, Latvia. Includes a live (very simple) hack demo of wifi networks.

    Video

    View on Facebook
    ·Share

    Share on FacebookShare on TwitterShare on Linked InShare by Email

    Proudly powered by WordPress | Theme: Moesia by aThemes