Security

Wed
29
Aug
John Lister's picture

Google Warns: Major Security Flaw in Fortnite Game

The makers of the hit video game "Fortnite" have called Google irresponsible for revealing a security flaw. The controversy follows Epic Games choosing not to use the Google Play store to distribute the game. Although it's free to download and play, ... Fortnite has proved hugely lucrative thanks to in-game purchases. Although 'buying' character costumes and animations doesn't affect gameplay, gamers - many of them children - have now spent more than a billion dollars. With so much money at stake, it appears Epic Games didn't want to go through Google Play for the Android version. Had ... (view more)

Tue
21
Aug
John Lister's picture

Skype Offers Secret Calling, End-to-End Encryption

Skype has added a new "private conversations" feature. Calls made this way will be encrypted so that it's impossible for anyone to usefully intercept or listen in. The data for such calls will use end-to-end encryption. That means the data is ... encrypted on one user's device and kept that way throughout its journey over the Internet until it reaches the other user's device. If the data is intercepted, it won't be of any use. The system will work on a "conversation" basis rather than a call-by-call basis. One user must select the feature, which will then send ... (view more)

Wed
15
Aug
John Lister's picture

Mock Election Site Hacked By Pre-Teen

An 11-year-old boy hacked a replica of a Florida election website in just 10 minutes. Officials have downplayed the incident saying it's not an accurate recreation of how such hacking could work. The hack took place at DefCon, an annual conference ... for people interested in computer security. It often has competitions and demonstrations of security vulnerability - and certainly isn't a place you would want to connect your wireless device to unknown WiFi networks. One of the events at the conference was the DefCon Voting Machine Hacking Village. Participants, including many children, attempted ... (view more)

Wed
08
Aug
John Lister's picture

US Military Bans Fitness Trackers, Citing Spy Risk

The US Department of Defense (DoD) has banned military staff from using geolocation tools such as GPS-enabled fitness trackers in "operational areas." The move follows fears such data could be unintentionally public and threaten security. Earlier ... this year fitness tracker company Strava published a worldwide map showing the most popular routes for its users to run and carry out other exercise activity. The map showed routes in increasing levels of brightness depending on their popularity. Middle East Bases Unintentionally Mapped Several users then spotted several routes in countries such as ... (view more)

Thu
02
Aug
John Lister's picture

Gov't Staff Revert to Typewriters After Ransomware Attack

Staff of a local government in Alaska have switched to typewriters after a ransomware attack crippled their computer network. Officials are currently rebuilding the system from scratch. The attack hit Matanuska-Susitna Borough, which covers the ... region just north of Anchorage. The problems began on July 24, though officials believe the malware may have been on the system for several weeks before activating. IT staff spotted the ransomware attack thanks to antivirus software , but had to start manually removing some of the more sophisticated elements. They also reset all passwords as a security ... (view more)

Wed
01
Aug
John Lister's picture

Google Bans Apps That Hijack Device Resources

Google is to ban several categories of apps from its app store. They include so-called "cryptomining" apps that can suck up a resources from a device for somebody else's financial benefits. The changes come in the latest update of the Play Store ... Developer Policy. The relevant apps will no longer be available through the official Play Store, meaning that although users can still install them, they'll get much less prominence and exposure. The ban is specifically on apps that use a device's processor for mining cryptocurrencies. In very simple terms, mining involves computers racing to solve a ... (view more)

Tue
31
Jul
John Lister's picture

Chrome Security Warnings Revamped: What You Need to Know

If you use Google's Chrome browser, you may have started seeing warnings that a website is not secure. Here's what it means and what's changed. What's the change? Google has changed the way it displays information about websites in the space on the ... left of the address bar at the top of the Chrome display. Originally this space was only used to indicate when a website was secure via a padlock symbol. Later on Google gave this more emphasis, adding the word "Secure" and marking both in green to stand out. Until now, the fact that a website isn't secure hasn't been explicitly stated: it's just ... (view more)

Thu
26
Jul
John Lister's picture

Google Fights Phishing Scams using USB Key

Google says it's suffered zero phishing attacks since it started making staff use a physical key to log in to work accounts. Of course, it's possible it's been hit with attacks it doesn't know about. The measures were taken to prevent against ... phishing attacks in which scammers try to trick victims into following a link and opening a bogus website that appears to be from a legitimate organization. The idea is that they then type in login details which the scammers can use to access their account on the real website. This can be particularly problematic with business accounts that may house ... (view more)

Wed
25
Jul
John Lister's picture

Microsoft: Phishing Scam Targets Politicians

Microsoft says hackers have targeted at least three candidates for Congress. Security experts say the group behind the attacks has been linked to Russia's intelligence services. The revelation came at the Aspen Security Forum in a speech from Tom ... Burt, Microsoft's head of Customer Security ... (view more)

Wed
18
Jul
John Lister's picture

Chrome to become Slower, Use More Memory to Tackle Malware

Google is updating the Chrome browser to give it better defenses against major security threats. It comes at the price of reduced performance and a larger memory footprint. The changes are to address two security bugs labeled Meltdown and Spectre by ... researchers. They take advantage of a flaw in almost every computer processor built since 1995, which is (as of this day) 100% of all computers, tablets, smartphones, laptops - and anything else that uses a processor. The flaw is in regard to a processor feature, which is designed to speed up a computer's response time. It works by using spare ... (view more)

Pages

Subscribe to RSS - Security