MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

App Privacy Settings

20/6/2025

0 Comments

 
Our smartphones are extensions of ourselves, holding a vast amount of personal data. From our photos and contacts to our location history and even our health metrics, these devices are treasure troves of information. But with every new app we download, we're asked to grant various permissions – often with a quick tap of "Allow" without a second thought. The critical question is: are these apps truly respecting our privacy, or are they quietly collecting more data than they need, potentially exposing us to unseen risks?
Picture

Just as we've come to accept that our voice assistants might be listening for commands and pushing ads our way, it's time to extend that scrutiny to every app on our phone. Many apps, even seemingly innocuous ones, can demand excessive access to your device's features and data.


The Hidden Dangers of Over-Permissive Apps

When you grant an app permission to access your microphone, camera, contacts, or location, you're opening a door. While some permissions are essential for an app's core functionality (e.g., a camera app needs camera access), many others are not. Granting unnecessary permissions can lead to:

  • Data Leakage: Sensitive information, from your messages to your financial details, could be accessed, stored, or even transmitted without your knowledge or consent.
  • Unwanted Surveillance and Tracking: Apps with access to your location, microphone, or camera can potentially monitor your movements, conversations, or surroundings. This data can then be used for targeted advertising, behavioural tracking, or worse.
  • Identity Theft and Fraud: Apps with access to contacts, photos, or emails can make you vulnerable if their security is breached, potentially leading to identity theft or unauthorized transactions.
  • Battery Drain and Performance Issues: Apps constantly running in the background, collecting data, can significantly impact your phone's battery life and overall performance.

Cybersecurity experts frequently find that many apps request far more permissions than they actually need. It's a common practice for developers to cast a wide net, and for users to click "Allow" without fully understanding the implications


Check Settings
-> Security and Privacy (Android and Apple) -> Permission Manager.


You can then tap
Camera and see what apps have access and change/update.


Also check Location, Microphone, Contacts, Calendar, etc…


Ep344
Image created by AI
0 Comments

Free Password Managers

19/6/2025

0 Comments

 
In our tech-world, every online service demands a unique login, managing passwords has become a cybersecurity tightrope walk. Thankfully, major tech giants like Apple, Google, and Microsoft have stepped up, offering free, built-in password managers as part of their ecosystems. But as with all things free, the question for us here and across Australia, is: are they good enough, or are you compromising security for convenience?
Picture

These platform-based password management tools have come a long way from being simple browser autofill features. They've evolved into surprisingly capable, often cross-platform, solutions designed to simplify our digital lives.

The Upside: Convenience and Integration

For many users, the appeal of these free options is undeniable. They come with several compelling advantages:

  • No Extra Downloads: They're already integrated into your operating system or browser, meaning no additional software to download or install. This "set and forget" simplicity is a major draw.
  • Automatic Syncing: Passwords automatically sync across all your devices linked to your Apple ID, Google Account, or Microsoft Account. Log in once on your phone, and it's there on your laptop.
  • Integrated Security: Their security features are deeply embedded within the respective platforms, leveraging existing account security measures like two-factor authentication.
  • Cost-Free: The price is right – free!

The Downside: Limitations and Niche Use

Despite their growing capabilities, these built-in managers do come with certain limitations, particularly when compared to dedicated, paid password management services:

  • Platform Lock-in: While they are becoming more cross-platform, their seamlessness often shines brightest within their native ecosystem. If you frequently switch between, say, an iPhone, an Android tablet, and a Windows PC, you might encounter usability quirks or reduced functionality.
  • Basic Feature Set: They typically offer a more fundamental set of features. Dedicated password managers often include advanced capabilities like secure sharing, dark web monitoring, emergency access, and more robust auditing tools that these free options lack.
  • Usability Across Divides: While Google's password manager, for example, is becoming quite versatile across platforms, users deeply entrenched in one ecosystem might find others less intuitive when using a rival's password manager.

So, Should You Use Them?

The verdict largely depends on your digital habits. For users who are not particularly tech-savvy, or those with relatively simple online needs and a strong preference for staying within a single ecosystem (e.g., an all-Apple household or someone who lives entirely in Google's cloud), these platform-based password managers are a perfectly viable and secure solution. They offer a significant upgrade over reusing simple passwords or writing them down.

However, for individuals who frequently switch between different operating systems or browsers, manage a high volume of complex online accounts, or require advanced features like secure sharing or password auditing, a dedicated, paid password manager might offer a more robust, versatile, and ultimately more secure experience. Ultimately, the best password manager is the one you actually use consistently to generate and store strong, unique passwords.

Ep343
Image created by AI
0 Comments

Camera Privacy

19/6/2025

0 Comments

 
A significant and disturbing cybersecurity vulnerability has come to light, revealing that over 40,000 security cameras across the globe are live-streaming footage completely unsecured and exposed to the internet. This alarming revelation poses a massive privacy concern for individuals and organizations alike.
Picture

According to cybersecurity firm Bitsight, these cameras are broadcasting video feeds that can be accessed without any form of authentication, encryption, or even the most basic password protection. This means anyone with the right tools or knowledge can potentially view private spaces and activities.
The United States appears to be a major hub for this vulnerability, with nearly 14,000 potentially exposed cameras. The states with the highest concentrations of these unsecured devices include California, Texas, Georgia, and New York.

​Bitsight's Cyber Threat Intelligence team has unearthed evidence suggesting that these unsecured feeds are a hot topic in dark web forums. Cybercriminals are reportedly discussing and sharing methods, tools, and techniques to gain unauthorized access to these video streams. Worse still, access to these unprotected cameras is being bought and sold, highlighting the lucrative nature of exploiting such privacy breaches.


Australia is not immune to this widespread issue. Cybersecurity experts and government bodies here frequently warn that many Internet of Things (IoT) devices, including security cameras in Australian homes and businesses, are deployed with inadequate security, often relying on weak or default passwords. This leaves them wide open to exploitation.


Actual instances of unsecured camera footage being accessed in Australia have been reported. For example, a rug shop in Cairns was found to be live-streaming its camera footage to a site linked to Russian hackers. Similarly, a mechanic was alerted that his activities were being streamed live online to a compromised website during a home service call. These incidents underscore the tangible risk to privacy and security posed by unsecure camera setups.


This incident serves as a stark reminder of the critical importance of cybersecurity best practices, particularly when setting up internet-connected devices. Users of security cameras, whether for personal or business use, must ensure their devices are properly secured with strong, unique passwords, encryption where available, and limited external access to prevent becoming part of this widespread privacy nightmare.


Ep342
Image created by AI
0 Comments

Passkeys Database

12/6/2025

0 Comments

 
Are you ready to try passkeys?

Not heard of them? Where have you been?

For decades, passwords have been the shaky foundation of our digital lives. They're too weak, easily stolen in data breaches, frequently forgotten, and a constant source of online frustration. We've endured endless password resets, complex strength requirements, and the nagging fear of phishing attacks. There is a better way and they’re called Passkeys.
Picture

The benefits are simple: 
​

Phishing Resistant: Passkeys are inherently resistant to phishing. Since you're not typing a password, there's nothing for a fake website to steal. The authentication happens directly between your device and the legitimate service.
Simpler Login: No more typing complicated passwords or struggling with autofill. A quick glance or touch is all it takes.
More Secure: Cryptographic keys are far more robust than even the strongest human-created passwords.
Device-Linked Convenience: Your passkeys are often synced across your devices, making it easy to log in from anywhere you trust.

While passkeys are rapidly gaining traction, they're still a relatively new technology, and not every website or service has implemented them yet. This can leave users wondering: "Where can I actually start ditching my passwords?"

This is where passkeys.directory steps in.

This site helps: 

Discover compatible services: Easily find out which of your favorite apps and websites now offer passkey login.
Learn how to enable passkeys: Many entries on the directory might include quick guides on setting up passkeys for specific services.
Stay updated: As more companies roll out passkey support, the directory will provide a live overview of the expanding ecosystem.

Ep341
Image created by AI
0 Comments

Lock Your Phone

12/6/2025

0 Comments

 
In our hyper-connected world, our smartphones and other personal devices are veritable treasure troves of sensitive information. From banking apps and personal photos to work emails and social media accounts, these gadgets hold the keys to our digital lives. Yet, despite their immense value, a surprisingly high number of people forgo one of the most basic, yet crucial, security measures: a screen lock.
Picture

Whether it's a PIN, password, pattern, fingerprint, or facial recognition, enabling a screen lock on your phone, tablet, or laptop is your first and most essential line of defense against unauthorized access. It’s the digital equivalent of locking your front door; without it, anyone can simply walk in.

The Risks of an Unlocked Device:
​
  • Data Theft and Identity Theft: If your device falls into the wrong hands, whether lost or stolen, an unlocked screen grants immediate access to your entire digital world. This includes personal messages, photos, financial apps, saved passwords, and contact lists. A thief could quickly extract enough information to commit identity theft, access your bank accounts, or impersonate you online.
  • Privacy Compromise: Even if a malicious actor isn't looking for financial gain, an unlocked device exposes your private conversations, Browse history, and personal media to anyone who picks it up. This can lead to embarrassment, blackmail, or simply a profound invasion of privacy.
  • Unauthorized Use: A child could accidentally (or intentionally) make in-app purchases, send inappropriate messages, or access content they shouldn't. In a professional context, sensitive company data could be viewed or even leaked if an unlocked work device is compromised.
  • Malware Installation: With direct access to your device, an attacker could quickly install malicious software, spyware, or ransomware, further compromising your data and device functionality.
  • "Find My Device" Feature Blocked: If your phone is stolen and unlocked, a thief can easily disable features like "Find My Device" or "Erase Device," making it impossible for you to locate or wipe your data remotely.

Choosing the Right Screen Lock:

Modern devices offer various options, each with its own balance of convenience and security:

  • PIN (Personal Identification Number): A classic and reliable choice. Opt for at least 6 digits and avoid obvious sequences like birthdays or "1234."
  • Password: The most secure option, especially if it's long and complex (combining letters, numbers, and symbols). This is ideal for devices that store highly sensitive information.
  • Pattern: While convenient, patterns can sometimes be guessed by observing smudges on the screen. If you use one, make it complex and avoid common shapes.
  • Fingerprint Recognition: Fast and secure, leveraging your unique biometric data. Most modern smartphones offer this.
  • Facial Recognition: Increasingly common, offering quick access. Ensure your device's facial recognition is robust and not easily fooled by photos.

So, make it a habit:


Enabling a screen lock takes mere seconds to set up in your device's security settings. Most devices allow you to choose how quickly the screen locks after inactivity (e.g., immediately, after 30 seconds, 1 minute). For optimal security, set it to lock almost instantly.


In an age where our devices are extensions of ourselves, protecting them is paramount. A simple screen lock isn't just a recommendation; it's a fundamental pillar of personal cybersecurity. Don't leave your digital life exposed – lock it down.


Ep340
Image created by AI
0 Comments

Location Sharing

12/6/2025

0 Comments

 
It's a common scene in modern families: a quick glance at a smartphone app confirms a child has arrived safely at school, or a partner is on their way home. For many, location-sharing apps offer invaluable peace of mind, providing real-time updates on loved ones' whereabouts. But beneath this comforting surface lies a complex web of data collection, one that can create an invisible digital trail far wider than most users realise.
Picture

Cybersecurity experts are increasingly sounding the alarm, highlighting the inherent cyber risks that come with such highly sensitive data, particularly the danger of this collected information falling into the wrong hands through data breaches or misuse. This raises a crucial question: are we trading too much privacy for the convenience of knowing exactly where everyone is?

​For many families, apps like
Life360 embody the promise of constant connection and safety – real-time location tracking, crash detection, and emergency alerts. The idea of always knowing where your loved ones are can be incredibly reassuring. However, cybersecurity experts are increasingly highlighting the inherent cyber risks that come with such highly sensitive data, citing past incidents and persistent privacy concerns surrounding these omnipresent tools.


These "family safety" applications typically operate by continuously monitoring GPS signals, often enhancing accuracy with Wi-Fi and Bluetooth data. Users form "Circles" to share their whereabouts with chosen contacts, receiving automatic notifications for arrivals and departures from designated locations. While some premium features even extend to identity theft protection and dark web monitoring, the core function—constant location data collection—creates significant vulnerabilities.

Reports and analyses have consistently pointed to several critical areas of concern:

  • Data Selling and Sharing: Perhaps the most unsettling aspect revealed about certain location-sharing apps, including Life360, is their past practices of allegedly selling precise location data of their millions of users to third-party data brokers. While companies might claim to anonymize this data, experts caution that it can often be re-identified, potentially exposing sensitive routines and exact whereabouts to unknown entities. This raises the serious risk that your personal movements could be used for targeted advertising, or even worse, for less legitimate purposes by unknown parties. Although Life360 has publicly committed to ceasing the sale of precise location data, the history of such practices underscores the inherent risks.
  • Data Breaches and API Vulnerabilities: The Threat of Exposure: No digital system is perfectly impervious to attack. A notable incident involving Tile, a company acquired by Life360, saw a hacker exploit outdated login credentials of a former employee to gain unauthorized access to users' personal data. This included names, addresses, emails, and phone numbers, raising the specter of phishing attacks, smishing, or even physical threats based on leaked daily routines. Cybersecurity analysts have also identified API (Application Programming Interface) vulnerabilities, where a deeper dive into an app's underlying data requests could potentially expose sensitive information not visible on the user interface. When such personal and location data is breached, it can lead to identity theft, stalking, or other forms of targeted crime.
  • Gaps in Fundamental Security Practices: Some analyses suggest that specific location-sharing apps may fall short on crucial cybersecurity safeguards. This can include a lack of mandatory two-factor authentication (2FA) – a vital barrier against account takeovers – and insufficient measures to deter brute-force login attempts. The absence of email validation during signup can further simplify the creation of fraudulent accounts by malicious actors, increasing the likelihood of unauthorized access to sensitive user data.
  • The Extent of Data Collection: Beyond just geographical coordinates, these applications can gather an extensive amount of personal data. This can include driving behaviors (like speed and braking patterns), phone usage while driving, specific device information, and even in-app communications. While some of this data serves the stated safety features, the sheer volume of personal information centralized in one location significantly magnifies the potential consequences if a breach or misuse occurs, providing a rich target for cybercriminals.

While location-sharing apps undoubtedly offer a sense of security, users must critically evaluate the privacy trade-offs and cybersecurity risks involved. It is paramount to meticulously review an app's privacy policy, configure permissions to the absolute minimum required, employ robust and unique passwords, enable multi-factor authentication whenever possible, and remain perpetually vigilant for any suspicious activity linked to your accounts. For families weighing the benefits against the potential perils, exploring alternatives with stronger privacy guarantees or engaging in transparent conversations about data sharing boundaries is crucial.


Ep339
Image created by AI
0 Comments

Cryllic Alphabet

7/6/2025

0 Comments

 
The Cyrillic alphabet has significant relevance for hackers, primarily because of a tactic known as homoglyph attacks (also sometimes called homograph attacks or script spoofing).
Picture

Here's why it's a valuable tool for cybercriminals:

  • Visual Similarity to Latin Characters: Many characters in the Cyrillic alphabet (used in languages like Russian, Ukrainian, and Serbian) look identical or extremely similar to characters in the Latin alphabet (used in English and many other Western languages).

    • For example, the Latin "a" (U+0061) and the Cyrillic "а" (U+0430) appear indistinguishable to the human eye in many fonts. The Latin "o" and the Cyrillic "о" are another common pair.
    • This visual trickery is the core of the attack.
  • Deceiving Users in URLs and Email Addresses: Hackers exploit this visual similarity to create fake website addresses (URLs) or email addresses that look exactly like legitimate ones.
​
So basically, in the past the links were obvious to detect as they go to unexpected addresses. Now they actually look correct but the changes font for particular letters can completely change the destination.

How to Protect Yourself

  • Hover Before Clicking: Before clicking on any link in an email or message, hover your mouse cursor over it. This will reveal the actual URL in your browser's status bar (usually at the bottom of the screen). Carefully inspect the URL for any unusual characters, especially if it looks slightly "off."
  • Look for xn--: If the URL in the status bar starts with xn--, it's an Internationalized Domain Name. While not all IDNs are malicious, this is a major red flag and warrants extra scrutiny.
  • Type URLs Manually or Use Bookmarks: For sensitive websites (like banking, email, or shopping), always type the URL directly into your browser or use a trusted bookmark. Never click on links from emails or messages to access these sites.
  • Use Multi-Factor Authentication (MFA): Even if an attacker manages to steal your password through a homoglyph attack, MFA adds an extra layer of security. This requires a second verification step (like a code from your phone) before access is granted.
  • Keep Software Updated: Modern web browsers, email clients, and operating systems often include built-in protections against homoglyph attacks. Regularly updating your software ensures you have the latest defenses.
  • Be Vigilant and Educated: User awareness is paramount. Understand what homoglyph attacks are and how they work. Share this knowledge with others. If something feels suspicious, err on the side of caution.
​
Ep338
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Facebook
0 Comments

SVG Phishy Attachments

7/6/2025

0 Comments

 
The latest tool in the hacker’s arsenal is the SVG file. We should all be wary of email attachments and really be sure of their legitimacy before attempting to open them.
​

There's a new and sneaky way hackers are trying to trick people, and it involves something you might think is harmless: image files. Cybersecurity experts recently discovered a new wave of phishing emails that are using special image files called SVGs to sneak past your email security and steal your information.

Think of an SVG file like a super-smart picture. Unlike regular photos you take with your phone, SVGs are actually based on text. This means they can do more than just show a picture; they can also contain hidden instructions, like tiny computer programs. This makes them great for websites because they can look good on any screen size and even be interactive. But now, bad guys are using this clever feature against us.

Here's the trick: hackers are putting secret instructions inside these SVG image files. When you open the SVG file (which might look like a simple invoice or a document), those hidden instructions kick in. They tell your computer to automatically send you to a fake website that looks exactly like a real one, perhaps your bank or a well-known online service. Their goal? To get you to type in your usernames and passwords, which they then steal.

What makes this so tricky is that many security tools are designed to spot typical dangerous files like Word documents with tricky macros or PDF files. But because SVGs are often seen as innocent image files, these tools might not look inside them for hidden dangers.

Watch out for Phishy emails especially as specific events are nearing. Tax time is a good one.
​
Picture
Picture
Ep337
Image Source: Screenshot taken by MITE Radio
0 Comments

Risks of Keeping Emails

2/6/2025

0 Comments

 
Do you keep your emails forever?
​

Do they contain sensitive data, attachments perhaps with sensitive data like taxation info, passport applications, etc…?

Well your emails are typically stored on a server (or cloud system) somewhere in the world which could potentially be breached. Also, if your password is cracked then the hacker has access to all of your emails past present and future - if you catch my meaning. They can be you!
Picture

Your main email account with Google, Microsoft, Apple may be pretty robust, but what if you connect your email to other services like a calendar, to-do list, CRM system. These third party systems may provide hackers a back way into your accounts.

So be aware of what's in your email and maybe file some things elsewhere as well as deleting them if they have served their purpose. Consider encrypted cloud storage (Google Drive) or perhaps Vaults Apps like OneDrive and Dropbox. 

Oh, don’t forget to empty the trash.

Ep336
Image created by AI
0 Comments

Microsoft Recall

2/6/2025

0 Comments

 
New Microsoft CoPilot PCs come with Recall functionality.

What is it and do I want it?

Basically, the core idea of Recall is to give your PC a "photographic memory" of everything you've seen and done, making it instantly searchable. Sounds cool, maybe you do want it?
Picture

​To sweeten the deal and make you a tad more comfortable, all the data is stored locally on your PC and you can search through it all with the help of CoPilot anytime, even if you are offline… but…

Microsoft's "Recall" feature has sparked significant cybersecurity and privacy concerns. While Microsoft has implemented safeguards, the nature of the feature inherently introduces new risks.

These include:
​
  • Potential for Unauthorized Access/Disclosure: All the points, from "Centralized Data Repository" to "Accessibility to Compromised Data," describe scenarios where sensitive user data could be accessed by unauthorized individuals (attackers, malware, or even unintentionally by others).
  • Increased Attack Surface: "Centralized Data Repository" and "Massive Data Collection" fundamentally increase the amount and type of data an attacker could potentially steal if they compromise your device. More data means more opportunities for leverage.
  • Bypassing Security Controls: "PIN/Biometric Reliance Vulnerability" and "Living Off the Land Attacks" highlight how existing device security (like a PIN or biometrics) can be bypassed or exploited once the system is compromised, allowing access to the Recall data.
  • Data Integrity and Confidentiality Concerns: "Incomplete Sensitive Information Filtering" means Recall might fail to protect data you assume it would, compromising its confidentiality.
  • Privacy Compromise with Security Ramifications: "Erosion of Private Communications" (your data being captured on someone else's device without your consent) is a significant privacy concern that can have security implications (e.g., exposing sensitive conversations or credentials).
  • Forensic and Legal Exposure: "Undeniable Digital Footprint" creates a permanent record that could be used against you in various contexts, which is a risk to personal privacy and potentially security.
  • User Error/Misunderstanding: "Opt-in vs. Default Confusion" and "User Error" are risks because they show how users might inadvertently expose themselves due to a lack of understanding or misconfiguration, which can be exploited.

So if you’re in the market for a new PC and you buy one with Microsoft-Copilot, consider turning Recall OFF!


Ep335
Image created by AI
0 Comments

3rd Party Providers

29/5/2025

0 Comments

 
Let me start with an old bugbear of mine: Outsourcing!

Outsourcing some business function allows organisations to concentrate more on core business activities and when implemented strategically, can ultimately result in better productivity, profits, shareholder dividends and more. Outsourcing to third party providers that specialise in those core business systems and provide the service at a competitive price can be a good option for many organisations. Staff costs alone can be significantly reduced. The problem is (and the question I have always had) - what is the compromise?

Picture
It used to be quality of service. A third party might not give you the same level of service you had previously and have come to expect, just make a support call to Telstra or Optus or iiNet and you’ll quickly see what I mean. But more scarily, what guarantees do we have that they are doing at protecting our privacy and data?
Clearly, they’re not all doing so well.

What does that mean for us? We don’t have a choice which 3rd parties our accounts go through, who our data is shared with or even where it is stored.

Cybercriminals are increasingly sophisticated, shifting their focus from direct assaults on well-defended organizations to exploiting their trusted partners. These "supply chain attacks" leverage a single point of entry within a vendor's system to gain unauthorized access to multiple, often larger, client networks. This trend is alarming, with figures showing a dramatic surge in such incidents over the past few years. 

As a consumer, it’s frustrating to feel like your data is at risk due to a company's third-party providers, especially since you have no direct control over their security practices. 

However, there are definitely proactive steps you can take to minimize your exposure and protect yourself:

1. Be Mindful of What You Share (and Where):

  • Data Minimization: Before signing up for a service or making a purchase, consider if you really need to provide all the information requested. Many forms ask for optional details. If it's not essential, don't provide it.
  • Review Privacy Policies: While they can be lengthy, try to skim privacy policies for key information. Look for sections on data sharing with third parties, data retention periods, and how they protect your information. If a policy is vague or doesn't seem to prioritize your privacy, consider if you truly need to use that service.
  • Limit Account Creation: Do you really need an account for every single website you visit? If it's a one-off purchase, consider using a guest checkout option if available to avoid creating a persistent data profile.

2. Strengthen Your Own Digital Hygiene:

  • Strong, Unique Passwords: This is paramount. Never reuse passwords across different accounts. Use a strong, complex password (a mix of uppercase, lowercase, numbers, and symbols) for each service. A password manager can help you manage these securely.
  • Enable Multi-Factor Authentication (MFA): Whenever possible, activate MFA (also known as two-factor authentication or 2FA). This adds an extra layer of security, usually requiring a code from your phone or a hardware key in addition to your password. Even if a third-party breach exposes your password, MFA can prevent unauthorized access to your account.
  • Be Skeptical of Phishing Attempts: Data breaches, especially those involving contact information, are often followed by phishing attempts. Be extremely wary of unsolicited emails, texts, or calls asking for personal information, login credentials, or urging you to click suspicious links. Always verify the sender and the legitimacy of the request.
  • Keep Software Updated: Ensure your operating system, web browsers, antivirus software, and all applications on your devices are regularly updated. These updates often include critical security patches that protect against known vulnerabilities.

3. Act Quickly When a Breach is Disclosed:

  • Monitor for Breach Notifications: Pay attention to news about data breaches, especially from companies you do business with. Companies are often legally required to notify affected individuals.
  • Change Compromised Passwords Immediately: If you're notified of a breach affecting a service you use, change your password for that service immediately. If you've used the same password on other sites (which you shouldn't!), change those too.
  • Enable Fraud Alerts/Credit Freezes: If the breach involves sensitive financial information or identity data (like Social Security numbers), consider placing a fraud alert or credit freeze on your credit reports with major credit bureaus. This makes it harder for identity thieves to open new accounts in your name.
  • Monitor Financial Statements and Credit Reports: Regularly review your bank and credit card statements for any suspicious activity. You're entitled to a free credit report from each of the major credit bureaus annually – take advantage of this to check for any unauthorized accounts or inquiries.
  • Be Wary of Scams: Be extra vigilant for scam calls or emails that claim to be from the breached company, offering "help" or asking for more personal information. Always go directly to the company's official website or customer service number to verify any communications.
​
Ep334
Image created by AI
0 Comments

Adidas Latest Cyber Victim

29/5/2025

0 Comments

 
Sportswear titan Adidas has confirmed a significant data breach stemming from a compromise of one of its third-party customer service providers, leading to the exfiltration of customer contact information. What initially appeared to be localized incidents affecting Adidas Turkey and Adidas Korea has now been confirmed as a broader, global event.
Picture

The company released a statement acknowledging that an "unauthorised external party obtained certain consumer data through a third-party customer service provider." Adidas has swiftly initiated containment measures and launched a comprehensive investigation with the assistance of leading information security experts.

Crucially, Adidas has reassured customers that "The affected data does not contain passwords, credit card or any other payment-related information." The exfiltrated data primarily consists of "contact information relating to consumers who had contacted our customer service help desk in the past."

Previous disclosures regarding the regional breaches in Turkey and Korea indicated that the compromised data included full names, phone numbers, dates of birth, gender details, and email addresses. These regional reports also emphasized that no passwords or financial information were accessed.

Given Adidas's vast international reach, with operations in 50 countries and a staggering 303 million members in its adiClub loyalty program, the potential scale of this incident is considerable. If the breach impacts customers who have contacted their help desk globally, millions of individuals could have had their contact information exposed.

Adidas has commenced the process of notifying potentially affected consumers, as well as relevant data protection and law enforcement authorities, in compliance with applicable laws. "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident," the company stated.
​

As of reporting, no threat actors have publicly claimed responsibility for the breach. The incident underscores the escalating risks associated with third-party vendor relationships and the critical importance of robust supply chain cybersecurity.

Ep333
Image created by AI
0 Comments

Android 16 Security Updates

23/5/2025

0 Comments

 
Google is rolling out a significant suite of new security and privacy features for Android devices in 2025, heavily focusing on combating increasingly sophisticated phone and text message scams. The updates aim to provide users with more intelligent, on-device protections to safeguard against fraud and data theft.
Picture

A major highlight is smarter in-call protections designed to thwart common scam tactics. Android will now actively warn users and even block specific risky actions during calls with non-contacts. This includes preventing the disabling of Google Play Protect, blocking the sideloading of unverified apps, and restricting the granting of dangerous accessibility permissions – all common requests from phone scammers. If screen sharing is active during a call, Android will also prompt users to stop sharing once the call ends.

Building on these in-call defenses, Google is piloting enhanced protections specifically for banking apps in the UK, starting with partners like Monzo, NatWest, and Revolut. If a user launches a participating banking app while screen sharing with an unknown contact, their Android device will issue a warning and offer a one-tap option to end the call and stop sharing, directly addressing the growing threat of screen-sharing banking scams.

Also, Scam Detection in Google Messages is becoming even more intelligent. The AI-powered feature, which already flags suspicious conversational patterns, is expanding its scope to detect a wider variety of scams, including those related to toll fees, cryptocurrency, financial impersonation, gift cards, and technical support. Crucially, this advanced detection happens entirely on-device, ensuring user privacy.

To combat impersonation scams in messaging, Google is introducing Key Verifier for Google Messages on Android 10+ devices later this summer. This feature will allow users and their contacts to confirm each other's identities by verifying unique encryption keys through QR code scanning or number comparison. If a contact's verification status changes (e.g., due to a SIM swap or compromised account), the Google Contacts app will flag it, providing a crucial warning that the sender might not be who they appear to be.

Finally, Google is enhancing Advanced Protection with a new device-level setting. This will simplify the activation of Google's strongest security features for all users, not just high-risk individuals, providing a comprehensive defense against sophisticated online attacks and data risks.

These significant updates underscore Google's ongoing commitment to evolving Android's security landscape, aiming to empower users with smarter, more proactive defenses against the ever-changing tactics of cybercriminals.

Maybe consider an Android for your next phone.
​
Ep332
Image created by AI
0 Comments

Dracula Aust Post SMS Scam

19/5/2025

0 Comments

 
Australia Post has issued a warning about a new sophisticated text and email scam circulating, known as "Dracula". This phishing scam involves fraudulent messages claiming a parcel delivery failed due to an invalid postcode. These messages contain malicious links designed to steal your personal information.
Picture

Invalid Postcode Claim: The messages typically state that a delivery could not be completed because of an incorrect postcode.

Malicious Links: Recipients are urged to click on a link to supposedly resolve the issue or reschedule the delivery. These links lead to fake websites intended to steal your data.

Sophisticated Techniques:
This scam uses advanced methods to bypass phone and network filters, allowing it to spread through iMessage and Rich Communication Services (RCS), making it harder to block.

Part of "Darcula" Operation: Australia Post has identified this as part of a larger "Dracula" phishing-as-a-service operation, where scammers can access tools to mimic trusted brands.

Widespread Impact:
Australia Post's research indicates that over 90% of Australians have received a scam text or call, and nearly 74% have been targeted by parcel delivery scams.


How to recognise and be aware:

Australia Post will never ask for your password, credit card details, or account information via call, text, or email.

Unexpected Message: Be suspicious of messages you receive if you are not expecting a delivery.

Requests for Payment:
They will also never contact you asking for payment.


Suspicious Links:
Avoid clicking on any links in unexpected messages.


Sense of Urgency:
Scammers often create a feeling of urgency to make you act quickly without thinking.


Incorrect Grammar or Spelling:
While increasingly sophisticated, some scam messages may still contain grammatical errors or typos.


Non-Official Sender Information:
Check the sender's number or email address. Official Australia Post SMS messages may come from "AusPost" or a specific number like 0448 008 003 for messages you can reply to. Be wary of other numbers or unfamiliar email addresses.


How to protect yourself

Use the Official AusPost App: The safest way to track your deliveries is through the official Australia Post app. Check the app first if you receive a suspicious message.

Verify Information:
If you are unsure about a message, do not click any links. Instead, go directly to the official Australia Post website or app to check your delivery status.


Do Not Share Personal Information:
Never provide personal or financial information via a link in a text message or email.


Report Suspicious Messages:
You can report scams to the Australian Cyber Security Centre's ReportCyber website. You can also forward suspicious emails to [email protected].


Be Wary of Clickbait:
Be cautious of misleading information on unofficial websites or social media accounts that offer cash relief or claim changes to Centrelink or Australia Post requirements. Always check official ".gov.au" website URLs for government services.
​

Ep330
Image created by AI
0 Comments

What to If Involved in a Breach

15/5/2025

0 Comments

 
If you are involved in a hack attempt where your private information has been stolen, you need to be alert to the possibilities of your data being used by cyber criminals.
​

Contact the organisation and ask for assistance and/or perhaps IDCARE.

Cybersecurity professionals universally recommend changing passwords immediately after a data breach involving a service you use

Picture

​You should change your password for the affected organisations, websites and related accounts you may have. If you’ve used that (same) password elsewhere (which you should never do), change them too.


Make sure you have MFA setup on ALL your login accounts and if possible, choose the passkeys option or authenticator app. SMS is now considered the weakest 2FA option but better than nothing.


  • Use a strong unique password
  • Use MFA
  • Use a Password Manager
  • Remain Vigilant against subsequent Phishing attempts
  • Continue to monitor the situation

Ep329
Image created by AI
0 Comments

Google Bank Scam Stopper

15/5/2025

0 Comments

 
So cyber criminals are moving towards impersonating banking staff to help with remote banking on Android phones. They are convincing people to install remote software so they can be “helped” remotely while navigating and using banking apps.
​
Picture

Google is bolstering its fight against this type of financial fraud with a new feature designed to detect and prevent bank scams that occur during screen-sharing sessions. Building upon the existing "Scam Detection" on Pixel phones, the tech giant is developing a "BankScamCallDetectionService" aimed at thwarting criminals who impersonate bank officials and manipulate victims into handing over access to their accounts.

As revealed by Android Authority's recent findings within the Google Play Services beta, this upcoming feature will proactively identify a high-risk scenario: an incoming call from an unknown number coinciding with the user having their banking application open and actively sharing their screen. Unlike the current Pixel scam detection, this new service reportedly won't need to analyse call content. Instead, it will trigger an alert based on this specific combination of activities, a common tactic used by fraudsters to guide victims through their banking apps and drain their funds.

The system is designed to provide a clear and immediate warning to users when this potentially dangerous situation is detected, giving them the opportunity to hang up and report the suspicious number. Google is also reportedly maintaining an updated list of banking applications to ensure the feature remains effective against evolving threats.

This development leverages the enhanced privacy features introduced in Android 15, which allows apps to designate sensitive information that should be hidden during screen recording or sharing. It's anticipated that this new layer of protection will roll out through a Google Play Services update, making it accessible to a wider range of Android users beyond just Pixel devices. While still in testing, this proactive approach signals Google's commitment to safeguarding users from increasingly sophisticated and damaging financial scams.

Microsoft and Apple need to catch up!

0 Comments

Malware Scanning

13/5/2025

0 Comments

 
Has your phone suddenly become a battery-guzzling sloth? Is your laptop's fan whirring like a jet engine for no apparent reason? Is everything S L O W?  Subtle shifts in your device's performance or behavior could be silent red flags so it may be time to do some scanning for Malware. There are many virus companies that provide great antivirus protection but Malware is a slightly different kettle of fish that is better found using specialist software like my favourite - Malwarebytes.
​

Picture

Think of Malwarebytes as a smart guard for your devices.

Malwarebytes learns what normal activity looks like on your phone or computer. If a program starts acting strangely – using lots of internet when you're not using it, or opening on its own – Malwarebytes can notice this unusual behavior. It's like a security guard spotting someone acting suspiciously.

Malwarebytes also looks at the files on your device. It knows what healthy files usually look like. If it finds a file with weird characteristics that match known bad files, it gets suspicious.

This program also watches your internet connections. If your device tries to connect to websites known for spreading malware, Malwarebytes can block it.

So, if your device is acting weird, running a scan with Malwarebytes can help find and remove these problems. It's like having a smart detective look for and get rid of any unwanted guests on your phone or computer. Just remember to keep Malwarebytes updated so it can recognize the newest threats.
​

Try it for free and see how you like it. I like the peace of mind it gives me, especially if I’ve just accidentally clicked something I shouldn’t have.

Ep327
Image Source: https://www.malwarebytes.com/
0 Comments

Some Quick Anti-Scam Habits

13/5/2025

0 Comments

 
Here are 5 quick cyber tips to help avoid scams.
​

Picture

  1. Declutter Your Digital Life: Use the "Review digital wallet" feature in your banking app to see where your payment details are linked and remove any unrecognized devices. Check under Card Settings for most banks.
  2. ** scrutinize Email Addresses:** Scammers often use slightly altered email addresses that mimic legitimate ones. Watch out for misspellings or unusual domain extensions (e.g., ".co" instead of ".com").  
  3. Beware Public Wi-Fi: Avoid conducting sensitive transactions like banking or online shopping on public Wi-Fi networks, as your data could be intercepted.
  4. Ignore "Unsubscribe" Links in Spam: These can be fake and confirm your email address is active. Mark suspicious emails as spam instead.
  5. Stay Informed: Keep up-to-date with the latest scam trends by visiting Scamwatch or following them on social media for alerts.
​
Ep326
Image created by AI
0 Comments

Infostealer Malware

13/5/2025

0 Comments

 
An alarming investigation by cyber intelligence researchers has uncovered a significant trove of compromised credentials circulating on platforms like Telegram and the dark web. The data includes at least 14,000 Commbank customer passwords, 7,000 ANZ credentials, 5,000 NAB accounts, and 4,000 belonging to Westpac users.
​


Picture

Despite the robust anti-fraud measures implemented by these major financial institutions, cybersecurity experts are warning that affected individuals face a "definite" risk of financial loss. This discovery follows recent cyberattacks targeting Australian superannuation funds, where stolen passwords were used in attempts to access pensioners' accounts.

The Australian cybersecurity firm Dvuln, which unearthed this extensive breach, has determined that these passwords were not obtained through vulnerabilities in the banks' systems. Instead, they were directly pilfered from users' own devices that had been infected with insidious "infostealer" malware.
​

So, "This is not a vulnerability in the banks. These are customer devices that have been infected."

Infostealer malware is a particularly dangerous form of malicious software designed to infiltrate devices, silently harvest a wide range of sensitive data – including passwords, credit card details, cryptocurrency wallet information, local files, and browser data like cookies and autofill information – and transmit it directly to cybercriminals.

With Infostealer, the threat extends far beyond just banking credentials, noting that the average infostealer victim has hundreds of other account details stored in their browser, including PayPal and e-commerce accounts with linked credit cards.

Figures suggest around 58,000 infected devices in Australia alone with something in the order of 31 million devices worldwide.

The biggest risks are in Windows devices around 90% although mobile device numbers are on the increase.

  • Avoid phishing scams - don’t fall victim to these messages.
  • Keep software updated.
  • Use a good AV software package and keep it updated.

If you suspect a problem, get onto your bank and alert scamwatch.
​

Ep325
Image created by AI
0 Comments

Staying Scam-Savvy in 2025

5/5/2025

0 Comments

 
As we move further towards the new tomorrow, our collective tech priorities should be around fortifying our digital defenses against the ever-evolving world of scams. While increased awareness is making a dent in scam success rates, complacency is a dangerous enemy. It's time for a security check-up to identify any weak spots that scammers might exploit.
Picture

​Here's a handy guide to five habits that can help you stay one step ahead of the scammers:

1. Master Your Passwords: If you're still using the same old password across multiple accounts, now's the time for an upgrade. Strong passwords or passkeys should be a complex mix of at least 14 characters, including uppercase and lowercase letters, numbers, and special symbols. Consider using a password manager like Bitwarden, 1Password, or NordPass to generate and securely store strong, unique passwords for all your accounts. And crucially, always enable multi-factor authentication (MFA) whenever it's offered for an extra layer of security.  

2. Sharpen Your Scam Radar:
Scammers are becoming incredibly skilled at impersonating trusted organizations like banks or government departments. Be extra cautious of unexpected emails or social media messages asking for your information or urging you to download software. Remember the mantra: stop, check, protect. Take a moment to breathe, independently verify the communication by contacting the organization directly through official channels, and then block and delete any suspicious messages. Be particularly careful when sending money to new accounts. Features like CommBank's NameCheck can help by verifying account details before your first payment.


3. Practice Good Banking Hygiene:
Your banking app likely has built-in security features – use them! CommBank's Security check up, for example, allows you to manage location-based security, which alerts the bank to unusual account access locations. Review and enable security alerts for suspicious activity notifications. Regularly check and adjust your daily payment limits to match your typical spending habits. Keeping limits higher than necessary increases your potential loss if your account is compromised.


4. Check In With Your Circle:
Scammers often thrive on isolation. A simple way to stay safe is to regularly check in with friends and family. As a spokesperson for the National Anti-Scam Centre points out, "Everyone is vulnerable to scams at certain times, such as dating and romance scams after a breakup or a job scam when the cost of living is high. Scammers isolate you from your support networks. They want to create a situation where you rely entirely on them." Talking about potential scams can help you and your loved ones identify red flags.


5. Report Every Scam Encounter:
Even if you haven't lost money, reporting scams is crucial. By reporting incidents to the National Anti-Scam Centre via scamwatch.gov.au, you provide valuable information that helps them understand scam tactics, identify vulnerable populations, and work on disrupting and stopping these criminal activities. As their spokesperson says, "Your reports help the National Anti-Scam Centre identify the scams that are causing the most harm to Australians."
​

Ep324
Image created by AI
0 Comments

SuperCard X - Tap and Beware

5/5/2025

0 Comments

 
Think twice before tapping! A sneaky new way for criminals to steal your money has popped up, and it uses your phone's tap-to-pay feature (NFC). It's like a "malware-for-rent" service called 'SuperCard X' that helps bad guys target Android phones.
​

Picture
Here's the simple version of how it works:
​
  1. Fake Message: You get a fake text or WhatsApp pretending to be your bank. It says there's a problem and you need to call a number.
  2. Smooth Talker: A crook answers, acting like a bank worker. They trick you into giving them your card number and PIN over the phone. They might even try to get you to raise your spending limits in your banking app.
  3. Fake App: They then convince you to download a seemingly harmless app (they might call it "Reader") that actually contains the SuperCard X malware.
  4. The "Tap" Trick: The app asks for very few permissions, mostly just to use your phone's NFC. The crook then tells you to tap your bank card on your phone to "verify" it.
  5. Secret Data Grab: When you tap, the hidden malware reads your card's information and secretly sends it to the criminals.
  6. Digital Copy: The crooks use this stolen info on another phone with a special app ("Tapper") that acts like a digital copy of your card.
  7. Easy Spending: Now, they can just tap their phone at stores and ATMs to make small, hard-to-trace purchases using your money.

This is particularly scary because:

  • Sneaky Taps: Because the transactions are small and look normal, banks might not flag them as fraud right away.
  • Hard to Detect: This malware is designed to be sneaky and isn't easily picked up by phone security software.

The bad guys behind this seem to be Chinese speakers, and they're even offering support to other criminals who want to use this method.
This scam has already been seen in Italy.


What Google says:

Google says their Play Protect system should help protect you from apps with this kind of malware if you download them from the official Play Store. But be careful about installing apps from anywhere else!

The bottom line: Be super careful about messages asking you to call numbers or download apps, especially if they're about your bank. Don't tap your card on your phone if someone you don't trust tells you to!

Ep323
Image created by AI
0 Comments

AI Powered Spam

16/4/2025

0 Comments

 
​Spam emails are getting smarter, thanks to artificial intelligence. Where old spam was full of typos, AI can now create convincing messages, making it harder to tell what's real. But don't worry, there are still ways to spot and block this new wave of AI-powered spam, according to Android Police.
Picture
Here are 8 key signs to watch for:
  1. Unusual Tone and Repetitive Buzzwords: AI can struggle with tone, so emails might sound too formal or strangely casual. Watch out for overused marketing phrases.
  2. Lack of Personalization: AI spam often uses generic greetings like "Hi there!" instead of your name. Legitimate emails usually include some personal details.
  3. Suspicious Links or Attachments: Be wary of emails that push you to click on links or download files. Check for misspellings in URLs or unexpected attachments.
  4. Inconsistent Visuals: Real companies have consistent branding. AI-generated emails might have blurry logos or mismatched colors.
  5. Details That Don't Match: If an email claims to be from a company but the email address looks wrong (e.g., a Gmail address instead of a company domain), it's a red flag.
  6. Generous Offers: Be suspicious of emails promising free gifts or deals that seem too good to be true.
  7. Repetitive Ideas: AI writing can sometimes repeat the same idea multiple times with slightly different wording.
  8. Pushy Requests for Personal Information: Be cautious of emails asking for personal details, as legitimate companies rarely do this through email.

How to Fight Back:
While you can't eliminate all spam, here's how to reduce it:
  • Mark as Spam: If you see a spam email, mark it as spam in your email provider. This helps your provider's filters learn.
  • Use an Alternative Email: Consider using a separate email address for online registrations to keep your main inbox cleaner.
  • Block Senders: Most email services let you block specific senders to prevent future emails. In Gmail, you can find this option in the three-dot menu next to the sender's details.
By staying vigilant and using these tips, you can protect your inbox from the growing threat of AI-generated spam.

​Ep322 - Image by AI
0 Comments

MS Defender Security

12/4/2025

0 Comments

 
Microsoft Defender for mobile encompasses a couple of offerings from Microsoft, aimed at protecting mobile devices from various threats.
Picture
Microsoft Defender for Individuals:
  • This is geared towards personal users and families, and it's tied to a Microsoft 365 Personal or Family subscription.
  • It's an all-in-one security app that provides features like:
    • Antivirus scanning.
    • Threat monitoring.
    • Protection against phishing.
    • Dark web monitoring for personal information.
    • Credit monitoring (in certain regions).
    • Identity theft protection.
  • Essentially, it aims to provide comprehensive online security for individuals and their families across their devices.
So if you have MS 365 and you login to the app, you get the top-tier protection including ransomware protection for your OneDrive files if you choose to enable it.

You can run it on all your devices linked to your MS account and have a central administration and notifications at your fingertips. Is it any good? So far, so good… time will tell.

Ep321 - Image source: https://www.microsoft.com/
0 Comments

Password Audit

12/4/2025

0 Comments

 
At the risk of harping on about it, I’m going to harp on about it!

Weak passwords are a digital welcome mat for cybercriminals. A password audit is essential for safeguarding your online presence.

​
The Essentials:
  • Strong Passwords: Aim for 14+ characters, a mix of uppercase/lowercase letters, numbers, and symbols (!@#$%^&*). Avoid easily guessed personal information.
  • Password Managers: Use tools like Bitwarden, 1Password, or NordPass to generate and securely store unique, complex passwords. They also identify weak passwords.
  • Multifactor Authentication (MFA): Enable MFA wherever possible. It adds a crucial second layer of security.​​
Picture

​
Conducting Your Audit:
  1. Account Inventory: List all online accounts.
  2. Password Strength Check: Use a password manager or online tool to assess password strength.
  3. Update Weak Passwords: Replace weak passwords with strong, unique ones.
  4. Enable MFA: Activate MFA for all applicable accounts.
  5. Regular Review: Schedule periodic audits to maintain security.

By prioritizing strong passwords and MFA, you significantly enhance your digital security.

​Ep321 - Image by AI
0 Comments

Google Play Store Protection

10/4/2025

0 Comments

 
Google is ramping up its efforts to create a safer Android ecosystem, announcing a slew of new security measures aimed at protecting users from fraudulent and malicious applications on the Play Store. The tech giant outlined its security roadmap, detailing plans to empower developers to build secure apps and help users distinguish genuine apps from deceptive ones.

A key component of this initiative is the expansion of Google Play Protect. Building upon its existing live threat detection capabilities, Play Protect will now specifically target "malicious applications that try to impersonate financial apps." This targeted approach aims to combat the growing threat of fraudulent financial apps that can steal user data and funds.


​
Picture
This move comes in response to recent security breaches on the Play Store, including a large-scale ad fraud campaign that saw users unwittingly downloading "vapor apps" disguised as popular, legitimate applications. These apps aggressively displayed recurring ads, generating substantial revenue for fraudsters and proving difficult for users to remove. Google was forced to remove 180 such apps from the platform, highlighting the urgent need for enhanced security measures.
​

To further bolster user trust and app authenticity, Google will be introducing more verified badges. Notably, VPN apps will receive a "Verified" badge, providing users with a clear indication of an app's legitimacy. This initiative aims to establish a more reliable and trustworthy Play Store environment.
​
Key Security Enhancements:
​
  • Expanded Google Play Protect: Enhanced threat detection targeting fraudulent financial apps.
  • Verified Badges: Increased use of verified badges, starting with VPN apps, to signify genuine applications.
  • Developer Security Tools: Improved resources and tools for developers to build secure apps from the outset.
  • AI-Backed Threat Detection: Continued development and implementation of AI-powered systems to detect and prevent malicious activity.

Google's commitment to strengthening Play Store security reflects the growing importance of mobile security in an increasingly digital world. These new measures are designed to protect users from evolving cyber threats and ensure a safer Android experience.

​Ep319 - Image by MITE Radio (screenshot)
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN