The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.

The post WhatsApp announces end‑to‑end encrypted backups appeared first on WeLiveSecurity

Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity.

The post What is a cyberattack surface and how can you reduce it? appeared first on WeLiveSecurity

Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity.

The post What is a cyberattack surface and how can you reduce it? appeared first on WeLiveSecurity

From cybercriminal evergreens like phishing to the verification badge scam we look at the most common tactics fraudsters use to trick their victims

The post Beware of these 5 common scams you can encounter on Instagram appeared first on WeLiveSecurity

Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Elderly men and women were the main targets of the romance scams operated by the fraudsters.

The post Victims duped out of US$1.8 million by BEC and Romance scam ring appeared first on WeLiveSecurity

The university suffered a ransomware attack, however there is no evidence so far of data being accessed or stolen.

The post Howard University suffers cyberattack, suspends online classes in aftermath appeared first on WeLiveSecurity

We introduced Android’s Private Compute Core in Android 12 Beta. Today, we’re excited to announce a new suite of services that provide a privacy-preserving bridge between Private Compute Core and the cloud.

Recap: What is Private Compute Core?

Android’s Private Compute Core is an open source, secure environment that is isolated from the rest of the operating system and apps. With each new Android release we’ll add more privacy-preserving features to the Private Compute Core. Today, these include:

  • Live Caption, which adds captions to any media using Google’s on-device speech recognition
  • Now Playing, which recognizes music playing nearby and displays the song title and artist name on your device’s lock screen
  • Smart Reply, which suggests relevant responses based on the conversation you’re having in messaging apps

For these features to be private, they must:

  1. Keep the information on your device private. Android ensures that the sensitive data processed in the Private Compute Core is not shared to any apps without you taking an action. For instance, until you tap a Smart Reply, the OS keeps your reply hidden from both your keyboard and the app you’re typing into.
  2. Let your device use the cloud (to download new song catalogs or speech-recognition models) without compromising your privacy. This is where Private Compute Services comes in.

Introducing Android’s Private Compute Services

Machine learning features often improve by updating models, and Private Compute Services helps features get these updates over a private path. Android prevents any feature inside the Private Compute Core from having direct access to the network. Instead, features communicate over a small set of purposeful open-source APIs to Private Compute Services, which strips out identifying information and uses a set of privacy technologies, including Federated Learning, Federated Analytics, and Private information retrieval.

We will publicly publish the source code for Private Compute Services, so it can be audited by security researchers and other teams outside of Google. This means it can go through the same rigorous security programs that ensure the safety of the Android platform.

We’re enthusiastic about the potential for machine learning to power more helpful features inside Android, and Android’s Private Compute Core will help users benefit from these features while strengthening privacy protections via the new Private Compute Services. Android is the first open source mobile OS to include this kind of externally verifiable privacy; Private Compute Services helps the Android OS continue to innovate in machine learning, while also maintaining the highest standards of privacy and security.

Following the incident the company has updated its website and privacy policy to clarify its legal obligations to its userbase

The post ProtonMail forced to log user’s IP address after an order from Swiss authorities appeared first on WeLiveSecurity

ESET researchers have investigated a targeted mobile espionage campaign against the Kurdish ethnic group, and that has been active since at least March 2020.

The post BladeHawk group: Android espionage against Kurdish ethnic group appeared first on WeLiveSecurity