BLOG

SubjectData Blog and News

Cyber Security
Paul Asadoorian

Investigating Phishing Emails and Domains Using DomainTools Iris

This blog post is sponsored by DomainTools. For more information and product trials please visit https://securityweekly.com/domaintools. Investigation Time! You may be sitting at work early in the morning, enjoying your coffee and the peace and quiet that comes along with being the first one in the office. Like most, the first thing you do is

Read More »
Uncategorized
Nicola Davis

Scientists invent new technology to print invisible messages

Science Play Video Forget lemon juice and hot irons, there is a new way to write and read invisible messages – and it can be used again and again. The approach, developed by researchers in China, involves using water to print messages on paper coated with manganese-containing chemicals. The message, invisible to the naked eye,

Read More »
Uncategorized
Letters

YouTube’s fine and child safety online | Letters

The conclusion of the Federal Trade Commission investigation into YouTube’s gathering of young people’s personal information (‘Woeful’ YouTube fine for child data breach, 5 September) shows progress is being made on both sides of the Atlantic towards a more children-friendly internet. The company was accused of treating younger users’ data in the same way it

Read More »
Cyber Security
Agence France-Presse in Shanghai

Chinese deepfake app Zao sparks privacy row after going viral

Critics say face-swap app could spread misinformation on a massive scale A Chinese app that lets users convincingly swap their faces with film or TV characters has rapidly become one of the country’s most downloaded apps, triggering a privacy row. Related: The rise of the deepfake and the threat to democracy In case you haven’t

Read More »
Cyber Security
Alex Hern

Uighurs in China were target of two-year iOS malware attack – reports

Android and Windows devices also targeted in campaign believed to be state-backed Chinese Uighurs were the target of an iOS malware attack lasting more than two years that was revealed last week, according to multiple reports. Android and Windows devices were also targeted in the campaign, which took the form of “watering hole attacks”: taking

Read More »
Scroll to Top