Security

Wed
21
Feb
John Lister's picture

Microsoft Details Anti-Malware Cloud-Based System

Microsoft says it used artificial intelligence to not only spot and identify and attempted malware attack, but to block it more than a thousand times in the next half hour. It says the defense was possible thanks to Windows Defender being used ... locally on the victim's computer, as well analyzing the snippet of code using cloud-based antimalware. The company calls it an example of machine learning. This means computers are able to figure things out for themselves, rather than simply following 'true or false' routines that are part of a program. Similar to antivirus, the most basic level of anti ... (view more)

Tue
20
Feb
John Lister's picture

Google Exposes Unfixed Microsoft Edge Security Flaw

Google has revealed a security flaw with the Microsoft Edge browser before Microsoft released a patch. It's a controversial move with arguments across both the tech and security industries. The flaw in question is somewhat complicated. In very ... simplified terms, the flaw is to do with how Microsoft Edge converts website code into what users see on their computer screen when visiting a website. Google realized that it could work out precisely when the browser would access part of the computer's memory and use this knowledge to effectively set a booby trap. That could then force the computer to ... (view more)

Thu
15
Feb
John Lister's picture

Thousands of Sites Hit By 'Cryptojacking' Scam

Visitors to more than 5,000 websites had their computers hijacked to earn money for scammers. But the attack would have earned them less than $25 - and they aren't getting paid anyway. The attack involved compromising screen reader software called ... BrowseAloud. Websites can add the software to their site to make it easier for visitors with vision problems to browse the pages. Because the software is so widely used, compromising it was an effective way to reach a large number of computers - regardless of whether the owners needed to use a screen reader. The software is particularly popular ... (view more)

Wed
14
Feb
John Lister's picture

'Facebook Protect' VPN Tool Actually Spies on Users

The recently debuted 'Facebook Protect' feature has sparked controversy. Facebook says it's a tool to protect user privacy, but critics suggest it is nothing more than a tracking tool designed to collect user activity. The tool appears in the ... iPhone/iPad app for Facebook. Although the menu option is listed as 'Protect', it's actually a virtual private network (VPN) tool called "Onavo." A VPN works by creating the virtual equivalent of a private "tunnel" on the Internet. The tunnel then allows data to flow back and forth between a user's computer and the website or service they are ... (view more)

Thu
08
Feb
John Lister's picture

Latest Tech Support Scam Freezes Web Browser

Scammers have found a new trick that "locks up" a user's browser in an attempt to panic them into paying a bogus fee. Fortunately there's a simple way to get around the problem. The technique is the latest variant on a well-established scam in which ... compromised websites show bogus error messages claiming the computer has been infected with a virus. The user is encouraged to call a "tech support hotline," (usually in India) then tricked into making a credit card payment to the scammers to supposedly fix the problem. In some cases, scammers demand remote access to the computer and ... (view more)

Tue
30
Jan
John Lister's picture

Report: Fitness Apps May Compromise Military Security

Fitness apps used by soldiers may have inadvertently revealed their location and activities while deployed overseas. They've been warned to activate privacy options that can prevent data collection. The problem is with an app called Strava, which ... lets users track their activity when they go running or cycling. It goes beyond some apps that simply allow individuals to keep their own records or choose to share them with friends for motivation or suggested routes. Instead, Strava combines all the data collected from a reported 27 million users and produces "heat maps" that show the most ... (view more)

Thu
18
Jan
John Lister's picture

Chrome Extensions Labelled Rogue

A security firm says four malicious extensions for Google Chrome were downloaded a total of more than half a million times. It's asking why Google's vetting process didn't weed the malware earlier. Extensions in Chrome are similar to add-ons for ... other browsers - namely, third-party tools that improve the web browsing experience. Common examples include ad-blockers, password managers and tools for downloading videos from web pages (such as Youtube). Because extensions have some level of access to a user's Internet data (and even some control over their browsing), Google has some security ... (view more)

Wed
17
Jan
John Lister's picture

New Android Malware Most Powerful Yet

A newly discovered malware exploit offers hackers an incredible level of control and access. Fortunately the creators appear to be highly targeting their victims, though it's still a threat to ordinary users. Dubbed Skygofree, the malware affects ... users of the Android smartphone operating system. It is said to give the people behind the malware the ability to remotely carry out 48 different operations on an infected phone. These include targeted controls not previously seen, as well as more common malware exploitations. Some of the 'normal' options for the malware creators include the ability ... (view more)

Wed
20
Dec
John Lister's picture

'Password' Still a Common Password in 2017

A security company has released its list of the worst passwords of 2017. As always with this annual survey, it tells us more about culture than security practices. The list comes from SplashData, which compiles the rankings based on how many times ... particular passwords appears in leaked lists of user databases (mainly among English language users). The survey this year totaled more than five million passwords, though it's worth noting the company deliberately excluded leaks of passwords from adult sites. (Source: cnet.com ) The most common are hardly any surprise with "123456" beating out " ... (view more)

Thu
14
Dec
John Lister's picture

Trio Admits Hijacking Home Devices

Three Americans have plead guilty to hijacking more than 100,000 internet-connected devices. The group of infected machines (known as a "botnet") was then used to attack websites using a distributed denial of service attack (DDoS) to make websites ... unavailable. While most DDoS attacks are carried out on PCs, this attack in particular targeted weaknesses in smaller devices that use the Internet. This included routers, digital video recorders and wireless cameras. That's a significant point, as the tech security community has generally treated security flaws in such devices as a lower ... (view more)

Pages

Subscribe to RSS - Security