Remove tag detection-engineering
article thumbnail

Detecting Malicious Trackers

Schneier on Security

From Slashdot : Apple and Google have launched a new industry standard called “ Detecting Unwanted Location Trackers ” to combat the misuse of Bluetooth trackers for stalking. Starting Monday, iPhone and Android users will receive alerts when an unknown Bluetooth device is detected moving with them.

article thumbnail

Google and Apple deliver support for unwanted tracking alerts in Android and iOS

Google Security

Google and Apple have worked together to create an industry specification – Detecting Unwanted Location Trackers – for Bluetooth tracking devices that makes it possible to alert users across both Android and iOS if such a device is unknowingly being used to track them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Frameworks for DE-Friendly CTI (Part 5)

Anton on Security

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. Operating Model 1: CTI Feeds SOC / Detection Engineering Some organizations have a clearly defined and separate CTI team, which supplies information to different teams, functions and recipients.

article thumbnail

Apple and Google join forces to stop unwanted tracking

Malwarebytes

The specification, called Detecting Unwanted Location Trackers , will make it possible to alert users across both iOS and Android if a device is unknowingly being used to track them. Bluetooth tag manufacturers including Chipolo, eufy, Jio, Motorola, and Pebblebee have all said that future tags will be compatible.

article thumbnail

How we built the new Find My Device network with user security and privacy in mind

Google Security

Posted by Dave Kleidermacher, VP Engineering, Android Security and Privacy Keeping people safe and their data secure and private is a top priority for Android. The keys themselves have no location capabilities, but they may have a Bluetooth tag attached. Imagine you drop your keys at a cafe.

article thumbnail

North Korea-linked threat actors target cybersecurity experts with a zero-day

Security Affairs

The attacks that took place in the past weeks were detected by researchers at Google’s Threat Analysis Group (TAG). “Recently, TAG became aware of a new campaign likely from the same actors based on similarities with the previous campaign. ” reads the advisory published by Google TAG.

article thumbnail

Frameworks for DE-Friendly CTI (Part 5)

Security Boulevard

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. Operating Model 1: CTI Feeds SOC / Detection Engineering Some organizations have a clearly defined and separate CTI team, which supplies information to different teams, functions and recipients.