Security

Tue
15
Jan
John Lister's picture

Windows 7 No Longer Safe to Use in 2020 - Here's Why

January 2020 marks the end of extended support for Windows 7 from Microsoft. This means Windows 7 users have just one year left to upgrade to either Windows 8 or 10 (or an alternative), before their systems become a major security risk. Support for ... Windows 7 comes in a two-stage process. The first is known as mainstream support, which means the system is under warranty and Microsoft offers free technical support over the phone and its online forums. During this time, Microsoft also continues developing new features, and users can get hot fixes which patch any performance or security problems ... (view more)

Thu
03
Jan
John Lister's picture

Islamic State Supporters Hijack Twitter Accounts

The way Twitter handles 'dormant' accounts has been hijacked to promote terrorist material, according to a report. It's all to do with the way Twitter associates its accounts with email addresses. The report comes from TechCrunch and follows a ... sudden upsurge in posts that don't seem connected to the account in question, but instead appear to come from members or supporters of Islamic State. (Source: techcrunch.com ) The problem appears to stem from the fact that Twitter doesn't delete accounts even if they aren't regularly used and may even have been abandoned by their original users. ... (view more)

Mon
17
Dec
John Lister's picture

Android Phone Security Duped by 3D Printed Head

A 3D printed model head fooled facial recognition security features on four Android phones. It's not exactly a practical blueprint for thieves, but does show the security of such features varies dramatically between handsets. Thomas Brewster of ... Forbes commissioned a 3D model of his head that combined data from 50 cameras. It cost him a little over £300, equivalent to around $375 USD. (Source: forbes.com ) Angle ...<a href="/news/10470/android-phone-security-duped-3d-printed-head" class="more-link">view more

Thu
13
Dec
John Lister's picture

Android Ad Scam Hijacks Phones; Drains Data, Battery

22 Android apps are eating up data allowances to benefit scammers at the expense of phone owners, a security firm says. The apps are using smart phones to carry out fraud against online advertisers. Sophos says it's found 22 offending apps with a ... total of two million downloads. They are each described as offering simple games or basic utilities such as keeping the phone's flash activated to act as a flashlight. While they work as described, which helps get good online reviews and build credibility, the scam is happening behind the scenes. (Source: sophos.com ) The apps are used for click ... (view more)

Thu
06
Dec
John Lister's picture

Quora Site Hacked; Names, Emails and Passwords Stolen

Question site "Quora" has become the latest high-profile hacking victim, with details of more than 100 million users breached. Fortunately, the implications likely won't be as serious as some previous hacks. The site lets users post questions and ... then get answers from other users. A voting system means more helpful answers from its community means the best answers float to the top. Quora says its systems were accessed without authorization and that it discovered the breach on November 30, 2018. It says the exposed information included account information such as name, email address ... (view more)

Thu
29
Nov
John Lister's picture

Web Users Warned Over Browser Green Padlock Trickery

Security researchers have warned that nearly half of all phishing sites falsely display the browser padlock symbol commonly associated with secure websites. It's a reminder that the browser padlock symbol only covers one aspect of security. Most ... major browsers display the padlock symbol when a website uses a technology, most commonly Secure Sockets Layer (SSL), to encrypt data as it passes between the user's computer and the website, or vice versa. Such sites have an address starting "https://" rather than "http://". The purpose of the padlock symbol is to indicate to the user that the ... (view more)

Thu
22
Nov
John Lister's picture

Microsoft Moves Towards Password-Free Logins

Microsoft has announced several steps towards a world without passwords. It not so much a revolution at this stage, compared to a few measures towards convenience. The changes involve the way people login to Microsoft services such as the online ... edition of Office, Skype, Edge browser and the Xbox Live gaming service (on PCs) - all of which work via a single Microsoft account. Microsoft is building on "Windows Hello," an existing system for logging into a Windows 10 PC using a PIN code, facial recognition or a fingerprint reader, rather than relying on a password. Physical Keys An ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Thu
08
Nov
John Lister's picture

Hackers Sell Stolen Facebook Messenger Messages

Facebook messages are being sold online for the equivalent of 10 cents per user. It comes as the company unveils an "unsend" feature for messages sent in haste. The message for sale follows a breach of Facebook last year when hackers were able to ... take advantage of a security flaw to gain access to 50 million accounts. Ironically the hack took advantage of a 'View As' feature that's meant to protect privacy by allowing users check which parts of their account and data are publicly viewable. 81,000 Users Hit By Message Leak The offer on a hacker forum claims to include details of some ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Pages

Subscribe to RSS - Security