Security

Tue
23
Feb
John Lister's picture

Apple Refuses Court Order to Unlock Encrypted iPhone

Tech company leaders are backing Apple in its defiance of a court order to make it easier for the FBI to access a murderer's iPhone. However, a poll shows public support for officials despite Apple's claims that the order threatens security. The ... case involves a phone belonging to Syed Farook who, along with his wife, shot dead 14 people in California last December. He was killed in a police shootout, but the FBI wants to examine his phone to see if it contains any details about the planning of the attacks and links to terrorist groups. FBI Needs More Than 10 Password Attempts The ... (view more)

Wed
17
Feb
John Lister's picture

Hackers Demand $3.6M To Restore Hospital Computers

A California hospital has been unable to use its computer system for more than a week thanks to a ransomware attack. The hackers are said to be demanding more than $3 million in return for returning access. The Hollywood Presbytarian Medical Center ... has confirmed the attack but is keeping many of the details quiet. Local news outlets say it doesn't appear any personal data has been compromised and no patients have been put at medical risk. However, the attack has been highly disruptive. Staff are having to register new patients and update medical records on paper. Some patients and family ... (view more)

Thu
11
Feb
John Lister's picture

IRS Online Security Breach Affects 100k Taxpayers

The IRS has revealed that cyber attackers managed to trick its system in handing over more than 100,000 access codes for user accounts. Fortunately the breach was discovered before any sensitive data was compromised. The attack followed a data theft ... from a source outside of the IRS. The agency hasn't revealed what that was, but it appears to have involved a stolen list that included social security numbers. The attackers then set an automated program, or "bot" to work. Using stolen social security numbers (sourced from outside the IRS), the bot was used to generate E-file PINs ... (view more)

Tue
02
Feb
John Lister's picture

Goverment Claims on Encryption Challenged

A Harvard University report challenged the government's argument that online encryption helps criminals go undetected. The report also suggests that the "Internet of Things" will give law enforcement officials more opportunity to surveil suspects. ... Politicians and government agencies (such as the FBI) repeatedly make the case that the law fails to keep up with technology, especially when it comes to being able to monitor communications between suspected offenders. For example, recently-updated wiretapping laws can still prove to be unworkable, especially if data is encrypted ... (view more)

Thu
21
Jan
John Lister's picture

LastPass Password Manager a 'Phishing Risk'

A security researcher says he's published proof that users of password manager tool LastPass could easily be tricked into handing over login details. LastPass insists there is no bug with the service itself, but has made some changes to mitigate the ... issue. Sean Cassidy published details of the potential attack at a security conference. He says the way LastPass operates makes it too easy to create bogus looking login pages that could fool users into handing over their login credentials. According to Cassidy, two main problems combine to create the phishing risk. One is that LastPass ... (view more)

Thu
14
Jan
John Lister's picture

Password Manager Proves Security Risk

Google has uncovered a major bug in a security software tool that could expose user passwords to hackers. Its the second time in a matter of weeks that Google's found problems with security software . On this occasion the problem is with the ... antivirus package from Trend Micro, specifically a Password Manager feature. This allows users to store passwords securely with a master security code; at the touch of a button, users can then have them the program automatically fill in passwords and logins on websites. According to Google's Tavis Ormandy, the feature is installed by default with ... (view more)

Thu
07
Jan
John Lister's picture

Microsoft to Ditch Security Updates for Internet Explorer

Microsoft is to ditch support for all but the latest edition of Internet Explorer. The news coincides with reports that Microsoft's new Edge browser is rapidly falling from favor. The discontinued support Internet Explorer affects versions 8, 9 and ... 10 and will end on Tuesday, January 12, 2016. That will mark the final update for those systems, which will simply consist of an on-screen notification urging user to upgrade to Internet Explorer 11 or Edge. Officially, only Windows 7, 8, and 10 can run Internet Explorer 11, while Edge runs on Windows 10. Unlike some browsers such as Firefox ... (view more)

Wed
06
Jan
John Lister's picture

North Korea's PC Operating System: At a Glance

Two German researchers have revealed that the world's most secure operating system could be Red Star OS. If you've never heard of it, that's probably because it's used only in North Korea. Florian Grunow and Nikalaus Schiess say that the system, ... which was created by the country's government, tracks virtually every file a computer user opens or handles. (Source: ccc.de ) The system is widely used on publicly owned computers. Reports from the country say the very few privately owned computers in North Korea are more likely to run Windows XP. System Uses Open-Source Base ... (view more)

Thu
31
Dec
John Lister's picture

9 Million At Risk from Browser Security Tool

A popular antivirus browser extension has been labeled as a security risk by Google. The tool in question is called Web TuneUp and is a browser extension by AVG; in this case, the problem involves Web TuneUp and the Chrome Browser, but the threat ... itself likely includes other browsers as well. Web TuneUp works by validating links that appear on a web browser page, such as on a search engine results list. It then warns the user if a link points to a page that could compromise security. It's arguably overkill, given that Chrome includes similar tools - plus the fact that Google itself ... (view more)

Wed
30
Dec
John Lister's picture

MS Defends Windows 10 Policy to Copy Hard Drive Keys

Microsoft has confirmed it automatically uploads Windows 10 disk encryption keys to its servers. The company says it was a deliberate decision based on weighing up the worst case scenarios. The encryption key in question is not related to logging ... into and running Windows itself. Instead its an encryption of the entire hard drive of the device running Windows 10. This means that if somebody physically steals your computer, they can't make any sense of the data, even if it's been copied to another device (using a disk image backup, for example). Encryption Key Would Help Computer Thieves ... (view more)

Pages

Subscribe to RSS - Security