Category: Blog

  • A New Approach to Defeating Audio Capture Transcription

    In a previous message, we discussed the revelation that various videoconferencing apps were continuing to collect audio data even when microphones were muted, against the expectations of most users.   Taking concerns further, if you wish to guard against an unknown microphone surreptitiously listening in on your conversations, what can be done to make sure the recorded…

  • Muting in Virtual Meetings May Not Guarantee Privacy

    It is not unreasonable to assume that when you mute yourself in a virtual meeting, your microphone will no longer be accessed by the meeting application. However, a new study from the University of Wisconsin-Madison has found that in all cases, videoconferencing apps do not give up access to the microphone and collect some data.…

  • Apache HTTP Server Critical Vulnerability under Active Exploitation

    There are reports of active attacks on Apache servers. Apache HTTP Server 2.4.48 and earlier are vulnerable to a server-side request forgery (SSRF) flaw, allowing attackers to send crafted requests via a vulnerable server (turning it into a proxy) to target internal resources behind firewalls or arbitrary external systems.  The CVSS (Common Vulnerability Scoring System) score for this…

  • Another high-profile cybersecurity breach

    It is increasingly easy to generate large amounts of content online. With a click of a button, moments of our lives are created in photo and video and whisked immediately into the cloud. These digital assets can become a target to attackers for purposes of extortion, public embarrassment, using location meta-data for stalking, etc. In…