John Lister

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Tue
12
Sep
John Lister's picture

Microsoft Ends Windows 10 Automatic Download Lawsuit

Microsoft has promised it won't download new Windows software to users without permission again. The promise staves off legal action in Germany, though is somewhat outdated with the changes to the way Windows is developed. The legal case followed ... the discovery in 2015 that Microsoft had automatically downloaded Windows 10 installation files to users regardless of whether they had shown any interest in upgrading to the new system. The idea was to make it quicker for people get up and running if they did upgrade, as well as spreading out the load of Windows download servers to avoid the ... (view more)

Thu
07
Sep
John Lister's picture

Red Sox Accused of Cheating with Apple Watch

The Boston Red Sox are accused of cheating by using an Apple Watch as part of a scheme to relay signals to a batsman. It's a rule-breaking use of technology for an otherwise legitimate tactic. The Red Sox, like most teams, were trying to find a way ... to give batters an advantage by knowing what type of pitch is coming. Normally a catcher - sometimes with the advice of a coach - will signal a suggested pitch to the pitcher via hand gestures. The player placements mean the batter can't see this signal. In principle it's legitimate for the batting team to spot these signals and make the batter ... (view more)

Wed
06
Sep
John Lister's picture

Court: Employer Right to Monitor Computer Use Has Limits

A European court says an employee shouldn't have been fired for sending private messages while at work. The European Court of Human Rights (ECHR) overturned a lower court decision and said the employee's right to privacy had been violated. However, ... the court said the verdict was largely about the specifics of the case and that it didn't constitute an absolute ban on monitoring staff computer use, or create a right to private Internet access while at work. The case involves Bogan Mihai Barbalescu, a Romanian man fired in 2007 after using Yahoo Messenger at work to send personal and intimate ... (view more)

Tue
05
Sep
John Lister's picture

Pacemakers 'Recalled' Amid Hacking Concerns

Around 465,000 pacemakers have been 'recalled' over hacking fears. However, the St Jude Medical brand devices will be patched with a software update rather than removed and replaced. The pacemakers are radio controlled to allow doctors to alter the ... specific rhythm they aim for when regulating a heart beat. This radio control means doctors can adjust to the patients changing needs without the need to remove the pacemaker for alterations. That's important as the surgery for such a removal is inherently risky. No Signs Of Hack Attacks While the precise details haven't been revealed for obvious ... (view more)

Thu
31
Aug
John Lister's picture

700 Million Email Accounts Hijacked by Spammers

More than 700 million email addresses and passwords have been leaked online. While many are bogus, enough appear to be genuine that security experts have advised users to change their email passwords. The collection of account details does not ... appear to have been used for identity theft or other fraud. Instead, the collection has been marketed as a way to send spam messages. The idea is that spammers can login to the compromised accounts in order to send their unsolicited emails. This effectively flies under the spam radar, as most spam comes from IP addresses without any reputation. In this ... (view more)

Wed
30
Aug
John Lister's picture

Uber Ditches Post-Ride User Tracking

Uber has ditched a policy that meant it could track a user's location for five minutes after the cab has dropped them off. The move could be related to a change in management. Until last November, users had the option to only give the 'ridesharing' ... app permission to access location data on their phone while they were actually using it. Following an update, users had to choose between giving permission for continuous tracking or having location details switched off completely. Customers Choose Between Privacy and Convenience The latter option meant that although the app would still work, users ... (view more)

Tue
29
Aug
John Lister's picture

Fake News Sites Banned from Facebook Ads

Facebook is to ban ads from sites that habitually share bogus 'news' stories. The ban will apply even if the ads themselves don't point to the false stories. It's no secret that Facebook is one of the biggest sources of traffic for news sites, both ... legitimate outlets and those which deliberately run tantalizing but misleading, or outright false stories. The latter sites thrive on people sharing the bogus stories on social media sites, thus bringing more visitor and bumping up ad revenue. However, some sites also buy Facebook advertising as a way to attract visitors who will then share the ... (view more)

Thu
24
Aug
John Lister's picture

Software Firm tells Parents to Spy on 'Gay' Sons

A company selling spy software encouraged parents to use its tools to discover if their son was gay. It's now removed the article in question. Fireworld offers software that tracks use of a computer. It's designed to be installed by anyone with ... physical access to the computer, who then wants to track what somebody else is doing with it. The software treads a thin line under French law, which makes it illegal to install spyware (software that spies) on somebody else's computer. Fireworld warns customers to make sure they are acting legally, and there's at least an argument that it's legitimate ... (view more)

Wed
23
Aug
John Lister's picture

New Malware uses PC Power to Make Cash

Hackers could use your computer to literally make money. That's thanks to an unusual malware attack that doesn't involve any files, making it harder to detect. The "Coinminer malware" takes advantage of a Windows and browser bug nicknamed Eternal ... Blue. That's the same bug that was exploited in several high-profile ransomware attacks recently . While Microsoft has issued updates, it seems some users haven't installed the security patches. Malware Runs Inside Memory One big problem with the Coinminer malware is that it works in the computer's memory, rather than as ... (view more)

Pages

Subscribe to RSS - John Lister