FFT News Digest

We monitor the news so you don't have to

Date Headlines
Dec 16Greece bans commercial spyware...for private individuals | The indiscriminate exploitation of social media to attack targets | Musk uses Twitter to launch a manhunt | What happens when your iPhone is stolen | One ruse  to make sure you get the presents you want
Dec 9Warnings of a winter of cyber attacks against Ukraine | Human rights organisations breached | ChatGPT and cybersecurity (and some alarming opinions on the human race) | An about turn on those San Francisco police robots
Dec 2Password manager problems | Russia seeks ways to break into Signal | Musk advances on Apple and just as quickly retreats | San Francisco police get the nod to deploy their robots
Nov 25Twitter's moderation morass | Security issues at Mastodon | Another Twitter alternative | A major victory for law enforcement | The most popular password is...yup, you guessed | The plan to allow San Francisco police to use robots that are authorised to kill
Nov 18Twitter's security risks - and a warning for whistleblowers | UAE accused of long-term meddling in US affairs | Privacy concerns over event apps | Tuvalu's plan to create a digital copy of its history and culture
Nov 11Elon's house of chaos | Password abuse | EU parliament calls for spyware moratorium | The threat from nation states. No-leak headphones
Nov 4Elon's verification problem | Cybersecurity challenges and what to do about them | What we can learn from Liz Truss | Geolocation tricks | How to earn $2 million a year from LinkedIn
Oct 28Lessons from the bitter experiences of others | Don't be fooled by an apparent fall in ransomware attacks | Good and bad news on passwords | LinkedIn tries to get its house in order | Uganda outlaws sharing information about anyone without their permission
Oct 21Framing journalists | Why bother with deepfakes when phishing is so effective | Younger workers and their cavalier attitude to security | Mandatory apps for visitors to the World Cup in Qatar
Oct 14Spyware; the "existential crisis" for journalism | A phishing kit available to anyone with an email address | Killing off passwords | An incredible online scam finally hooks a victim 
Oct 7Surveillance in Mexico, China and the EU | Protecting against ransomware | More use of Microsoft Teams creates more challenges for admins | The Tory conference, Jacob Rees-Mogg and an adult dating site
Sep 30Some takeaways from the latest high-profile breaches | Regulate disinformation like guns, bombs and nukes |  Letting down spies | The "shameware" being used by churches in the US.
Sep 23Lesson's from incidents at Uber and LastPass | VMware summarises the key threats to consider | A record number of phishing attempts | Identifying deepfake audio | Moving from online crime to violent assault in real life
Sep 16An airing for more of Twitter's dirty laundry | Iran's latest phishing technique | The threat from a technologically dominant China | Apple's latest updates | The prisoner serving time for cybercrime who carried on scamming from his cell
Sep 9Apple's latest iPhone update and its ambitions in space | Iran denies attacking Albania | The scale of the market in stolen personal information | The TikTok data breach that wasn't what it seemed
Sep 2Greece wriggles on the spyware hook | €8 million to compromise iPhones and Androids | Getting tough with location brokers | Poking some well deserved fun at LinkedIn
Aug 26Twitter whistle blown | Hard times for the maker of Pegasus spyware | Google bans father over photo of his naked toddler | The insecure media sector | The US start-up that's making people sound 'whiter'
Aug 19Supply chain risks made real | The highlights of the annual Vegas hacking conferences | 14 EU countries among Pegasus customers | A(nother) vital update from Apple | The Janet Jackson song that can freeze old hard drives!
Aug 12Important lessons from high-profile incidents | Up to 20 years in jail for the Twitter spy | WhatsApp's new group features | The stalker headed to prison for stalking his ex-girlfriend with an AirTag
Aug 5Practical measures to combat ransomware | Spyware in Greece | Bypassing MFA | Some very persuasive scams | What's the life expectancy of your gadget?
Jul 29What to do about a problem like spyware | A withering report on the quality of cybersecurity training. Combatting the trolls | Turning the tables on a sextortionist | The fragile internet | The secure messaging app that turned out to be anything but
Jul 22Surveillance via spyware and data brokers | Russia's latest cyber tactics in Ukraine | Hacking our search habits | The GPS tracker that could be used to shut down a vehicle remotely | Important Apple updates
Jul 15Why and how nation states target journalists | A conviction in "one of the most brazen and damaging acts of espionage in American history.” | Defeating multi-factor authentication | Apple's rotten app store
Jul 8The latest on Ukraine | Stalking with AirTags | The Chinese threat | iPhone security measures | How conspiracy theories spread
Jul 1The privacy implications of overturning Roe vs Wade | Gartner highlights the supply chain in its cybersecurity predictions | The ransomware business evolves
Jun 24The dystopian state of surveillance | The UK's data protection pipe dream | Spyware maker fails to reassure European lawmakers | Market forces push down the prices of stolen and forged data
Jun 17Why web browsers make lousy password managers | Russia warns the West about cyber attacks | One email account; 69,000 people's healthcare data breached | Ring's audio functionality 
Jun 10The latest news from Apple, some of it really rather important | The unintended side effects of sanctions | Ransomware tactics | Voice recognition pros and cons | The artificial intelligence startup that was less intelligent and more artificial than advertised
Jun 3The power of publicity and the travails of a spyware maker | Ukraine's resourcefulness | China's Pacific strategy | Unearthing images. | A dangerous vulnerability in Microsoft Office
May 27The latest cybersecurity trends | The Ukraine conflict continues to provoke cyber attacks | Russia accused of leaking pro-Brexit emails | The obstacles to controlling the global spyware industry | The risks of internet-connected sex toys
May 20The multi-faceted information war in Ukraine - and elsewhere | Why iPhones' Find My feature is a potential threat | The extraordinary scale of commercial data tracking | Some details to persuade us that updates really matter
May 13Western allies call out Russia | Cybercrime is a $6 trillion global business | Surveillance in the US | A free tool to check your email security | Driverless cars as surveillance cameras
May 6Russia's real cyber aims in Ukraine | The Pegasus approach to undermining your critics | World Password Day; just use a password manager | The Chinese drone swarm that can track a human through a forest
Apr 29Twitter; what Elon wants | Russia's cyber preparations for invading Ukraine | North Korea hacks hacks | Criminals with nation-state powers | Apple's DIY repair kits that cost almost as much as a professional
Apr 22Pegasus lands in Downing Street | Critical infrastructure warning | 'Zero-days' double in number | Organisations ill-prepared for cyber attacks | An inventor, AI and the imaginary friend that tried to kill him
Apr 15Digital tactics in a brutal war | Spyware targets the European Union | Cyber takedown | When a muted mic isn't | IATA's Travel Pass
Apr 8Differing views on the use of cyber weapons in the invasion of Ukraine | Resisting curious voicemails | How to become a cyber criminal for $700 | Another case of Pegasus being used against journalists
Apr 1Generational upheaval vs cybersecurity failings | More details on what disabled thousands of satellite terminals in Europe | The threat from fake profiles - and phishy job listings | The Lapsus$ gang and their sneaky tactics | Google's controversial changes to Workspace
Mar 25Sage security advice from the White House | A sneaky attack via Chrome | Killing passwords | Some of the world's biggest companies, attacked by a teenager
Mar 18Deep fakes and Russian capabilities | Chinese spies and counterclaims | Router risks | Exploiting smartphones
Mar 11The horror in Ukraine. Remote working worries | Stalkerware | Identifying every human's face with the help of 100 billion photos | China accuses
Mar 4Ukraine; the impact of social media memes | Messaging apps | The ransomware biter bitten | The risks from lousy password
Feb 25The horror in Ukraine. Remote working worries | Stalkerware | Identifying every human's face with the help of 100 billion photos | China accuses
Feb 18The vulnerability crisis | Transcription scare | Unpicking an attack on the ICRC | Facial recognition (again) | Surveillance in the US
Feb 11The benefits of multi-factor authentication - and how to defeat it | Remote working risks | Ransomware gangs get professional | Age verification in the UK | News Corp's 2-year exposure
Feb 4Unpicking the spyware industry | Phishing lures that work. | The scale of the threat from China | Making the most of Microsoft 365 | Giving WiFi motion sensors
Jan 28How attackers have exploited the pandemic | Human Rights Watch hit by spyware | The new Cyber Essentials is launched | Booby-trapped websites | Spying on WhatsApp
Jan 21Spyware agogo| Cyber attacks in Ukraine | Relax! That Olympic app is fine, China says | Arresting developments | 2G risks
Jan 14Critical infrastructure under threat | A messaging shakeup | Pegasus in El Salvador | Hunting Facebook's tracking tool | Beware scum apps
Jan 7Media organisations targeted | When training doesn't work | Pivoting to privacy | When rebooting an iPhone isn't what it seems | Norton's plan to use your computer to create cryptocurrency

Address

124 City Road
London, EC1V 2NX

Contacts
Email: info@fullframetech.com
Phone: +44 (0) 20 3290 2205
Support: +44 (0) 20 3290 2207

Company registration no. 10243217