Security

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Tue
04
Oct
John Lister's picture

8 Tools that can Help Keep Your PC Secure

At Infopackets we're often asked to recommend security software and tools or give our opinion on specific products. While every product has its pros and cons, as the old saying goes, the proof of the pudding is in the eating. With that in mind, I ... thought I'd run down the actual tools I use in my day to day life rather than when we're testing out products. That means trying to find the balance of staying protected without taking up too much time and attention or computing resources. Permanent My main anti-virus software is Microsoft Security Essentials on Windows 7. It's ... (view more)

Thu
29
Sep
John Lister's picture

500M Accounts Stolen in Yahoo Data Breach

A US senator wants the Securities and Exchange Commission to investigate Yahoo's handling of a major data breach. Mark Warner says the company left the public, and specifically investors, in the dark. Last week the company announced that it was hit ... in late 2014 by an attack that it believed to have been backed by a foreign government. Around 500 million accounts were affected and the stolen data included names, email address, dates of birth, phone numbers and passwords. The good news is that the passwords were encrypted. The bad news is that the data also included security questions and ... (view more)

Thu
08
Sep
John Lister's picture

Adult Site Hacked; 800,000 Accounts Exposed

A hack of nearly 800,000 accounts on an adult entertainment site could be among the most embarrassing ever. The breach at "Brazzers" may expose some of the very personal tastes of the site's users. The stolen data doesn't come from the main Brazzers ... site, which sells access to videos the company has made itself. Instead, it comes from the site's discussion forum, where users can discuss the scenes on the site and talk about what they'd like to see in future videos. Passwords Stored Without Encryption The data is said to include 790,724 email addresses (not including ... (view more)

Thu
01
Sep
John Lister's picture

2012 Dropbox Hack Far Worse Than Feared

A 2012 hacking incident has turned out to be far worse than initially believed. It turns out that the theft of more than 60 million account details also included passwords. Online storage company Dropbox admitted to the breach at the time, but only ... said a list of email addresses of customers had been stolen. It either didn't know or didn't say that passwords were also compromised. The incident was particularly embarrassing at the time, as the hack proved simple thanks to a Dropbox employee's poor lack of judgement. The employee's LinkedIn password had been stolen as part of a ... (view more)

Tue
30
Aug
John Lister's picture

Browser Sync Tool Hacking Raises Security Fears

Users of the Opera browser's sync tools have been warned to change their passwords for every website. The organization behind Opera says the warning is with "an abundance of caution." The warning only covers people who use Opera's system for ... synchronizing bookmarks, passwords and other information so that they can access the feature on any computer. This covers around 1.7 million people among the 350 million who use the browser. Writing on a company blog, Opera's Tarquin Wilton-Jones said an attack on the system had been detected and, although quickly blocked, was ... (view more)

Thu
11
Aug
John Lister's picture

Google Says Android Bug Overblown

Google says a set of security flaws on Android devices may not be as serious as initially feared. It says 90 percent of devices should be largely immune from what's been dubbed the "Quadrooter" exploit. A security research company found the problem ... in software which works with processors manufactured by Qualcomm, which are used in an estimated 900 million Android devices. The bugs affect the communication between different actions (known as processes) running on the phone at the same time. The name of the exploit (Quadrooter) comes from the fact that there are four ... (view more)

Wed
03
Aug
John Lister's picture

Android Devices Get Hack Attempt Alerts On-Screen

Users of Android smartphones and tablets will soon get an instant warning when somebody attempts to log in to their Google account. The notification comes as an on-screen message, rather than by email. The new feature is designed to enhance ... two-factor authentication. That's an optional feature which means that if somebody tries to sign in to a Google account on another device, they will have to wait for a security code to be sent via email, text message or through a dedicated app so that they can continue to login to the account. If no code or the improper code is entered, then the ... (view more)

Thu
28
Jul
John Lister's picture

Smart Devices Could Expose WiFi Passwords, or Worse

Are smart devices a security risk? Security firm Rapid 7 seems to think so. According to the researchers, a range of Internet-connected light bulbs had at least nine security flaws. While the potential consequences are hardly life or death, it could ... be a blow to the concept of smart devices in the home. Osram's Lightify range of light bulbs lets users control lighting via a smartphone or tablet app. The idea is partly to allow more precise controls, such as dimming a bulb or even changing its color, and partly to allow users to remotely access the lights. For example, if a home owner is ... (view more)

Tue
19
Jul
John Lister's picture

'Lazy' Ransomware Deletes Every File in Sight

Is there fair play amongst ransomware scammers? A particularly lazy variant of "ransomware" is making its rounds, though researchers say that paying up will never pay off. For the most part, ransomware usually involves a nasty malware program ... encrypting files on a PC, followed by a promise of a decryption key - but only if the victim pays a ransom. It would make sense that if people stopped believing this would happen, they would stop handing over the cash. Files Deleted Rather Than Encrypted Now security company Talos has spotted a variant where there's absolutely no prospect ... (view more)

Pages

Subscribe to RSS - Security