Security

Wed
08
Jun
John Lister's picture

TeamViewer Remote Access Customers Hacked

Management at TeamViewer, a remote access computer tool, have confirmed that a "significant number" of users have fallen prey to hackers. However, the company insists that all evidence suggests that there is no flaw in the system, but is instead ... pointing fingers at its users. TeamViewer allows users to login to a remote computer (even their own) from anywhere with an Internet connection. Once connected, users can operate the computer just as if they had physical access to the machine. The security for the system works in two ways: first, users get a reference number that identifies ... (view more)

Tue
07
Jun
John Lister's picture

Facebook Chief Online Accounts Hacked

Two online accounts belonging to Facebook chief Mark Zuckerberg have been hacked. The incident, thought to have resulted from a LinkedIn data breach, is a high profile example of the dangers of poor password choices. The hackers, calling themselves ... OurMine Team, took control of Zuckerberg's Twitter account and posted a message informing him of the breach. They also claimed to have accessed his Pinterest account (which appears to be correct) and his Instagram account, which doesn't appear to be the case. Perhaps the one point of relief for Zuckerberg is that his Facebook account was not ... (view more)

Thu
02
Jun
John Lister's picture

Bloatware from 5 Major PC Firms 'A Security Risk'

A security firm says that laptops from five major PC manufacturers have inherent security flaws which make the systems open to attack the very first time they are used. The problem deals with the automatic update tools installed by the manufacturer. ... Duo Labs explored the pre-installed manufacturer software on laptops from Acer, Asus, Dell, HP and Lenovo. In total, they found 12 vulnerabilities which they described as being ridiculously simple to exploit. (Source: duo.com ) The software is what's officially known as Original Equipment Manufacturer (OEM) software, but commonly referred to ... (view more)

Tue
31
May
John Lister's picture

Four Major Site Login Databases Stolen

A series of massive but dated breaches of high-profile sites is yet another reminder of the dangers of poor password security. While the sites in question are taking preventative measures, experts warn that hackers could use the stolen details to ... access other sites. In the past few weeks, hackers have offered up massive hauls of stolen login details from four major sites. They include details of 360 million accounts from MySpace and 65 million accounts from Tumblr, both lists appearing to date from 2013. Questions Posed For Sites And Users This follows 164 million account details from ... (view more)

Wed
25
May
John Lister's picture

Google Works On New Alternative To Password

Google is working on an option to replace password logins on mobile devices with a "trust score" based on multiple factors. The idea is to combine all sorts of factors that aren't secure enough on their own. The idea is to balance the need for ... security with the hassle of remembering passwords by building on the concept of two-factor authentication. That's an existing philosophy that deals with the inherent weakness of using a single login factor such as a password. Two-factor authentication combines a password with another factor such as using a specific device or having ... (view more)

Wed
18
May
John Lister's picture

Irony Strikes As Hacking Site Hacked

A major website used by hackers to exchange stolen data has itself been hacked. The breach has exposed hundreds of thousands of user accounts. The site called "Nulled" hosted discussion forums for users to exchange tips on how to hack into websites. ... It also included a section for buying and selling data such as stolen account information. Ironically, given the new development, the site had the slogan "Expect the unexpected." At the time of writing, the site was offline for "temporary unscheduled maintenance," with its database leaked onto other websites for ... (view more)

Tue
10
May
John Lister's picture

Phone Manufacturers, Carriers Under Security Probe

Two government agencies are investigating the way smartphone manufacturers and wireless carriers issue security updates for devices. They say they are particularly worried about older devices being left unpatched. It's a rare joint probe by both the ... Federal Communications Commission (FCC) and the Federal Trade Commission (FTC). While the FCC usually handles issues relating to the Internet and smartphones, the FTC usually only gets involved in cases of misleading advertising or unfair contracts. That may suggest officials are exploring whether companies have overstated the security their ... (view more)

Thu
05
May
John Lister's picture

Hacker Gives Away 272 Million Stolen Accounts for $1

Stolen usernames and passwords from Yahoo, Google and Microsoft's webmail services are reportedly being traded by Russian criminals. They are said to be among a batch of 272.3 million accounts, though most are from a popular Russian service. The ... trade has been revealed by Hold Security in a discussion with Reuters. Hold's founder says his staff uncovered the batch when trawling an online forum used by hackers. The person who provided the information claimed he had a total of 1.17 billion records, but agreed to hand over a portion of them. It seems that while many criminals buy and ... (view more)

Thu
28
Apr
John Lister's picture

Hackers Weaponize Obscure Windows Feature

Microsoft has detailed the intricate and carefully crafted attack techniques of a longstanding group of online spies. They include taking advantage of a now-retired Windows feature for easier updates. Thankfully for home users, the attacks from the ... group Microsoft dubs "Platinum" have been highly targeted at government, defense, communications and intelligence agencies and organizations. That's promoted speculation a government may be behind the attacks. The details come in a report by Microsoft's Windows Defender Advanced Threat Hunting. It notes that while some attacks are ... (view more)

Tue
12
Apr
John Lister's picture

Researchers Claim to Unlock Ransomware Encryption

One of the nastiest ransomware variants may have been defeated. Two security researchers have reportedly figured out a way to recover access to an encrypted computer without paying an extortion fee. Most forms of ransomware involve infecting a ... victim's computer and then individually encrypts files. That leaves the victim able to run Windows, but unable to access any of their data. The Petya variant is more dangerous as it encrypts the hard drive's master file table. That's a database which has the details of every files on a computer, including those for Windows itself. If the master ... (view more)

Pages

Subscribe to RSS - Security