This week in Light Start, SpaceX's Starlink is captured, Sonic is coming late, some suspicious files go on sale, and Sony might be leaving SA.
WhatsApp may be expiring for some users, but those folks without worries on that front still have something to worry about. Certain versions of the app are vulnerable to an exploit that installs spyware, developed by Israeli outfit NSO Group according to reports. And the nasty part is the penetration method -- WhatsApp can be infected with nothing more than a missed call.
Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes. Most of these activities are secure because they come from sources that can be trusted. But sometimes criminals impersonate trustworthy sources to get you to click on a link (or download an app) that contai...[Read More]
What would it mean if you lost all of your personal documents, such as your family photos, research or business records? How much would you pay to get them back? There’s a burgeoning form of cybercrime that hinges on the answers to these questions. You have probably heard of viruses and malware. These dangerous pieces of software can make their way into your computer and wreak havoc. Malware autho...[Read More]
When malicious software, or malware, attacks, computer scientists and security researchers want to know how the attackers got into what was supposed to be a secure system, and what they’re actually doing that’s causing problems for users. It’s a growing problem, affecting government projects, retail stores and individuals around the world. However, fighting malware is a cyclical arms race: As defe...[Read More]
Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses. Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly. The recent Judy malware, for example, was reportedly found in 41 apps in the Google Play store. It seems to have made mon...[Read More]
Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online. Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity threats we face. While most of us would rather leave the problem to the IT department, it’s essential we ...[Read More]