FFT News Digest

We monitor the news so you don't have to

Date Headlines
Dec 17A truly awful security vulnerability | NSO considers its options | Safety in the metaverse | Getting lazy at home | Apple bows to privacy pressure....for the moment
Dec 10A spyware case study | Router vulnerabilities | Changes to Cyber Essentials | The risks in web browsers | Multiple MacBook problems emerge...as Apple plans new models
Dec 3Cracking down on cybercrime, except in Russia | China and COVID-19 disinformation | Abusing Rich Text Format files | The need to protect cloud resources | What encrypted messaging services will tell the FBI
Nov 26Pegasus has its wings clipped | GoDaddy breached | Cuts in ransomware insurance cover | Cloning fingerprints for $5 | Facebook and foreign language moderation
Nov  19Cyber manoeuvres | More on the scale of organised | crimeRansomware developments | Man in the middle attacks |Apple's patchy security updates
Nov 12The extraordinary scale of the spyware industry | Phishing stats | Hackers for hire | A persuasive hybrid scam | Crime figures up, prosecutions down, as scumbags pivot from the US to Europe
Nov 6Ransomware; damage, evolution and a victory for law enforcement | Spyware sanctions | Facebook and facial recognition | Fears about AI and quantum computing
Oct 29Facebook's (Meta's) next big challenge | A New York Times journalist hacked, repeatedly | WiFi risks | The ransomware business model evolves again | How Internet Service Providers make money from people's browsing
Oct 22Does it matter what Facebook calls itself? | Deep fake voices | US TV stations crippled | Restricting spyware exports from the US | A ransomware warning and advice
Oct 15An international summit agrees to fight ransomware, but China and Russia weren't invited | The fake news mastermind who helped elect Trump | How to defeat multi-factor authentication | Android snooping | Google's new security initiative
Oct 8What to do about a problem like Facebook | The US seeks partners to combat cybercrime | More light shone on China's cyber capabilities | Dubai's ruler plays dirty with Pegasus | The risk from insiders (especially disgruntled ones) | Windows 11 launches to a mixed reception
Oct 1Facebook hauled over the coals | Ransomware's impact on healthcare | A global view of offensive cyber capabilities | Authorised fraud | Amazon's less than amazing 'robot'
Sep 24A horribly bad week for Facebook | More warnings about ransomware | French government ministers hacked with Pegasus | A warning for Huawei and Xiaomi phone owners | Police sting the Italian Mafia
Sep 17Security vulnerabilities and surveillance | Unpalatable truths about Facebook | Ransomware and what to do about it | Abolishing passwords | Protecting yourself against software you didn't even know you were using
Sep 10Germany revealed as Pegasus customer | Protonmail hands over activist details | Unpicking coverage of WhatsApp's end-to-end encryption | How nation states target people they don't like | Apple tries to reverse out of cul-de-sac
Sep 3Cautionary tales about digital identity | Denial of service; threats and protections | Credential theft | T-Mobile and a 21-year old hacker | Multi-factor good, single-factor really bad!
Aug 27 Pegasus flies through Apple's defences | Facebook's radical approach to transparency | UK plays Pandora with data protection | Data harvesting | Bumble bungles location protection
Aug 20Tech and the Taliban | Website dangers | Passwords; employees understand the risks...and ignore them | FBI warns about insider spies | Ransomware; so easy anyone can have a go
Aug 13Apple explains its initiative to combat child sexual abuse | China spies on Israel, blames Iran | A spectacular hack in Belarus | Exploiting the pandemic | Watching us while we work...at home
Aug 6Pegasus - official confirmation and new competitors | Apple's plans to scan your iPhone | Ransomware update | The risk of public networks | What images reveal about us | Ransomware scumbags seeks to recruit insiders
Jul 30Cyber warfare and a shooting war | What Iran has been up to | Surveillance and journalists | The Virtual Private Network that wasn't as private as it should have been | The insider threat
Jul 23Pegasus; what's new? | China trades hacking accusations with the US and its allies | How safe is Telegram? | Social media and misinformation | When your location isn't as anonymous as it's supposed to be
Jul 16Ransomware group goes dark | Iranian hackers | Another Israeli spyware company emerges | Should you have to prove who you are to use social media | Facebook creeps
Jul 9Ransomware goes large | Framing your opponent | Browse with care | Weird WiFi names are more of a problem than first thought | Revealing the link between spyware and real-world violence
Jul 2700 million LinkedIn profiles published...but don't call it a data breach | How thousands of storage devices were wiped remotely | Lack of awareness | This week's spy news | The researchers who believe social media could end humanity
Jun 25More on ransomware, including scary figures on the number of businesses that close following an attack | The risks of cloud storage | Data privacy; what data privacy | Securing remote workers | Surveillance advertising
Jun 18The unstoppable rise of ransomware | Dumping passwords | Apple's recipe for email privacy | Big changes for Big Tech | Camera vulnerabilities
Jun 11Apple - big news and small print | Stolen passwords and old accounts | A spectacular success for law enforcement | A web failure and a silver lining
Jun 4What to do about ransomware | Nuclear flashers...and protecting sensitive data | The future of connectivity | WhatsApp caves in

May 28Cyber-espionage and the risks of doing nothing | Fines pick up pace as the GDPR turns three | Mass surveillance is OK if you protect what you gather | The insider risk, this time at the FBI | Facebook tries to seize the regulatory initiative

May 21The extraordinary profitability of ransomware | The dark patterns that persuade us | Apple chucks macOS under the iOS bus | Evidence planted on Indian activists | The awe-inspiring scale of digital crime
May 14Ransomware gets real | The human element behind 85% of breaches | Germany takes on WhatsApp, as users get ultimatum | Broken WiFi | Chinese disinformation
May 7Big tech, big battles | Bellingcat strikes again | Passwords, bloody passwords | Surveillance by TV | Router risks
Apr 30Apple; privacy and accusations | 48 ways to combat ransomware | Spyware. Russian tactics | The risks of QR codes
Apr 23Apple news, including the unintended release of plans to revamp the MacBook range | The extraordinary tale of North Korea's digital army | Facebook mistakenly reveals its PR strategy to deal with data breaches | How the UK hopes to secure internet-connected devices | EU proposals to regulate AI
Apr 16Breach. What breach? | Apple's 'butter knife' security | Russia sanctioned for cyber attacks | Farewell cookies, hello FLoC | Biometric security
Apr 9Breaches galore | Cyber war...and deep fakes | Hacking humans | Assassins for hire
Apr 2Ubiquiti's hapless breach response | The sophistication of North Korean hackers | The mirage of opting out of data analytics | Getting real about vaccine passports | Cybersecurity lessons from the pandemic
Mar 26Social media's dilemmas | Why China's spooked by Teslas | The dirty truth about Sky Bet | Safe browsing | How not to chase debts
Mar 19Sabre-rattling | Cyber crime hits record highs | The illusion of online privacy | Intercepting text messages for $16 | Moms breaking bad

Mar 12Exchange calamity | Proving who you are online | More criminals taken down | Russia hacks itself | Nonfungible tokens

Mar 5Assuming the worst...and Zero Trust | Blaming the intern | Conflicted security beliefs | Going passwordless (and a forthright Swedish ad campaign
Feb 26Defining 'cyberwarfare' | Amazon security concerns. Facebook, Australia and the chicken game | The power of open source intelligence | Mixing work and personal | Why you're feeling worn out by video calls
Feb 19Cybercrime; the $1 trillion business | Snooping emails | Facebook skates on thin ice | Chrome beats out macOS | 
SolarWinds and wilful ignorance
Feb 12Poisoned water, poor security and what not to do | Privacy | The sorry state of bug bounties | MacBook battery replacements

Feb 5Playing with fire...and ignoring the heat | Home printing rules | Attacking charity | Oversharing on social media...and on camera

Jan 29Social media bans and a lone protester in New York state | The pessimism of InfoSec leaders | Journalist safety | Data protection fines on the up | Amazon and its 'dark patterns' | The mind-boggling scale of data breaches
Jan 22Unpicking the aftermath of the Capitol Hill rampage | Cloud security | Privacy is us, says WhatsApp, as tens of millions sign up for alternatives | Dark Web marketplace takedown | Mesh WiFi | Warnings about male chastity cage fulfilled
Jan 15Disinformation and disorder | SolarWinds fallout | WhatsApp's new no-choice privacy policy | Media companies targeted | Ghislaine Maxwell, her phone and the police | Updates for leading web browsers
Jan 1Data transfers and the reality of "taking back control" | Tools to ease the life of Microsoft admins | 21 cyber criminals feel the long arm of the law | The latest threats; anyone for a cheap puppy?

Address

124 City Road
London, EC1V 2NX

Contacts
Email: info@fullframetech.com
Phone: +44 (0) 20 3290 2205
Support: +44 (0) 20 3290 2207

Company registration no. 10243217