{"id":74715,"date":"2012-08-10T16:00:23","date_gmt":"2012-08-10T10:30:23","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=74715"},"modified":"2012-08-10T16:00:23","modified_gmt":"2012-08-10T10:30:23","slug":"latest-security-news-from-the-last-week","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/latest-security-news-from-the-last-week\/","title":{"rendered":"Latest security news from the last week"},"content":{"rendered":"<p><strong>Tech journalist blames Amazon and Apple for hack<\/strong><br \/>\nMat Honan, formerly of Gizmodo, saw all his <a href=\"https:\/\/www.zdnet.com\/how-apple-let-a-hacker-remotely-wipe-an-iphone-ipad-macbook-7000002141\/\">accounts hacked<\/a> and devices wiped clean this week thanks to some elementary flaws in Amazon&#8217;s and Apple&#8217;s support systems. Anyone interested in security should read details about this &#8216;<a href=\"https:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/all\/\">epic hacking<\/a>&#8216;. Apparently, all the hacker wanted was Honan&#8217;s Twitter handle. This led to his iPhone, iPad and MacBook getting wiped clean; his Twitter and Gmail accounts getting blocked and a serious breach of his data and privacy.  <\/p>\n<p><strong>Experts say local security products can counter cyber threats<\/strong><br \/>\nSecurity experts claim that India needs to <a href=\"https:\/\/articles.economictimes.indiatimes.com\/2012-07-29\/news\/32923458_1_ethical-hackers-malware-hackers-conference\">start relying<\/a> on indigenous anti-malware products that are manufactured locally. More and more nations export low cost products and utilize these to carry out cyberespionage activities. While such hardware and software seems harmless at first, constant updates from the manufacturer regularly causes products to turn rogue.   <\/p>\n<p><strong>Deleted content remains on Facebook servers for months<\/strong><br \/>\nWhat do you think happens when you delete pictures or videos from Facebook? According to sources, such content stays on Facebook&#8217;s servers for months even after they have been deleted. This interesting <a href=\"https:\/\/www.zdnet.com\/blog\/igeneration\/facebook-does-not-erase-user-deleted-content\/4808\">news update<\/a> highlights this security flaw and we feel this is something that deserves more attention. It is rather alarming to learn that such information is not completely removed when we wish to do so.<\/p>\n<p><strong>Google tweaks rules for Android Market app developers<\/strong><br \/>\nIn order to combat the growing numbers of Android malware, Google has <a href=\"https:\/\/timesofindia.indiatimes.com\/tech\/enterprise-it\/strategy\/Google-gets-tough-with-app-developers\/articleshow\/15339240.cms\">revamped<\/a> certain rules and guidelines for app developers. Rules regarding application names, disclosure of personal information and payment policies have been tweaked. It is hoped that these changes would help reduce the number of malicious apps seen in Google Play (Android Market).  <\/p>\n<p><strong>Facebook provides email address to report phishing scams<\/strong><br \/>\nRampant phishing scams on Facebook can now be <a href=\"https:\/\/news.cnet.com\/8301-1023_3-57490592-93\/facebook-battles-phishing-by-reaching-out-to-users\/\">flagged<\/a> by sending an email to \u201c<em>phish@fb.com<\/em>\u201d. The social network aims to reduce phishing attacks by creating a new channel that works in partnership with their internal detection team.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech journalist blames Amazon and Apple for hack Mat Honan, formerly of Gizmodo, saw all his accounts hacked and devices wiped clean this week thanks to some elementary flaws in Amazon&#8217;s and Apple&#8217;s support systems. Anyone interested in security should read details about this &#8216;epic hacking&#8216;. Apparently, all the hacker wanted was Honan&#8217;s Twitter handle. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,32,153,21,41,92,133,4],"tags":[193,33,152,65,42,58,25,67],"class_list":["post-74715","post","type-post","status-publish","format-standard","hentry","category-android","category-apple","category-cyberwar","category-email","category-facebook","category-google","category-hacker","category-news","tag-amazon","tag-apple","tag-cyberespionage","tag-facebook-privacy","tag-facebook-scam","tag-hacking","tag-phishing","tag-third-party-apps"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/74715"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=74715"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/74715\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=74715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=74715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=74715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}