Security

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Thu
17
Nov
John Lister's picture

Smart Devices a 'Major Threat' when it comes to Cyber Warfare

A Harvard lecturer has warned Congress that only government regulations can prevent serious consequences from security attacks on the "Internet of Things." Bruce Schneier says there's little market incentive for buyers or sellers to fix a problem, ... should a problem arise. The Internet of Things (IoT) refers to the growing number of devices that can now be connected to the Internet, making them "smart devices". Rather than just computers and phones, the Internet of Things covers everything from thermostats to cars, often with the Internet connection allowing users remote ... (view more)

Wed
16
Nov
John Lister's picture

Report: 700M Android Phones Contain Chinese Spyware

Some cheaply made Android phones are reportedly sending copies of text messages to a Chinese source every 72 hours. The official explanation is that international customers have unintentionally received handsets with a "feature" designed for Chinese ... users. A security firm named Kryptowire made the discovery. It found that hidden software preinstalled in phones was contacting a Chinese server every three days and passing on details including contacts lists and call logs. The software also sent back daily updates with the full content of text messages and location data. (Source: ... (view more)

Wed
02
Nov
John Lister's picture

Microsoft Slams Google for Unveiling 'Critical' Windows Bug

Microsoft has criticized Google for revealing details of what the search giant has dubbed a "critical" security flaw in Windows. The two companies dispute whether Google gave Microsoft enough time to fix the problem before going public. The ... controversy lies in the fact that Microsoft has yet to release a fix for the problem and has not even said if one exists. The bug applies to 32-bit editions of Windows and allows an unauthorized local privilege escalation. The effect is to undermine a security feature known as " sandboxing ," which is designed so that if a hacker ... (view more)

Tue
25
Oct
John Lister's picture

Microsoft Warns: Fake Blue Screen of Death with 1-800 Number is a Scam

Microsoft has warned that scammers are trying to trick users with a fake "Blue Screen of Death" error message. The idea is to fool users into calling a bogus 1-800 tech support hotline. The Blue Screen of Death is an unofficial name given to a ... particular type of error message which appears when a Windows computer suffers a serious malfunction. In most cases, once the screen appears the only option is to reboot the computer, usually by switching it off with a physical power button or by resetting the machine with a reset button (if it is available). The idea of the screen is to give ... (view more)

Wed
19
Oct
John Lister's picture

Cops Could Force Non-Suspects to Unlock Phones

The Department of Justice has argued that police have the right to force anyone in a searched property to unlock phones with a fingerprint lock. Lawyers disputing the argument say that would go beyond the reasonable scope of a search warrant. It's ... the latest development in the ongoing development of privacy and search laws as technology evolves . For example, previous cases have concluded that police can't force somebody to provide a passcode or password to unlock a phone, because it would breach the Fifth Amendment's measures on self-incrimination. However, law enforcement ... (view more)

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Tue
04
Oct
John Lister's picture

8 Tools that can Help Keep Your PC Secure

At Infopackets we're often asked to recommend security software and tools or give our opinion on specific products. While every product has its pros and cons, as the old saying goes, the proof of the pudding is in the eating. With that in mind, I ... thought I'd run down the actual tools I use in my day to day life rather than when we're testing out products. That means trying to find the balance of staying protected without taking up too much time and attention or computing resources. Permanent My main anti-virus software is Microsoft Security Essentials on Windows 7. It's ... (view more)

Thu
29
Sep
John Lister's picture

500M Accounts Stolen in Yahoo Data Breach

A US senator wants the Securities and Exchange Commission to investigate Yahoo's handling of a major data breach. Mark Warner says the company left the public, and specifically investors, in the dark. Last week the company announced that it was hit ... in late 2014 by an attack that it believed to have been backed by a foreign government. Around 500 million accounts were affected and the stolen data included names, email address, dates of birth, phone numbers and passwords. The good news is that the passwords were encrypted. The bad news is that the data also included security questions and ... (view more)

Thu
08
Sep
John Lister's picture

Adult Site Hacked; 800,000 Accounts Exposed

A hack of nearly 800,000 accounts on an adult entertainment site could be among the most embarrassing ever. The breach at "Brazzers" may expose some of the very personal tastes of the site's users. The stolen data doesn't come from the main Brazzers ... site, which sells access to videos the company has made itself. Instead, it comes from the site's discussion forum, where users can discuss the scenes on the site and talk about what they'd like to see in future videos. Passwords Stored Without Encryption The data is said to include 790,724 email addresses (not including ... (view more)

Pages

Subscribe to RSS - Security