Articles

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Wed
14
Aug
John Lister's picture

Chrome, Firefox Ditch EV SSL Padlock System

Chrome and Firefox will stop indicating when websites have received an "extra level of verification" to prove they are in fact genuine. The move is largely due to the fact that most users aren't aware of the Extended Validation SSL (EV SSL) system. ... The Extended Validation SSL (secure socket layer) security certificates go beyond the standard SSL certification scheme, which browsers use to show that data being sent to and from a website is in fact encrypted and secure. This means that communication is encrypted, and that no one can eavesdrop or steal data mid-stream. In other words, ... (view more)

Tue
13
Aug
Dennis Faas's picture

Scammed by Quick PC Experts? Here's What to Do

Infopackets Reader Jeanie G. writes: " Dear Dennis, I believe I have been scammed by Quick PC Experts ( quickpcexpert.com ). I was using my web browser and suddenly a virus warning appeared on my screen, stating that I needed to call Microsoft ... certified support at 1-855-724-2570 . There was no way for me to close the virus alert window. I was very frightened and so I called the 1-800 number. The person I spoke to had a very thick Indian accent . Quick PC Expert then confirmed that my computer was infected, and that's when I let them remotely connect to my PC. They installed a firewall and ... (view more)

Mon
12
Aug
John Lister's picture

Apple Offers $1 Million For iPhone Hack

Apple is offering a million dollar bounty to anyone who can successfully hack an iPhone and shares the details. But its limited to specific circumstances that will mean the payout is well worth it for the company. Like several tech giants, Apple ... already had a reward scheme for people who find and report bugs. To date the biggest bounty Apple has offered is $200,000 and only to people who have previously been approved to explore Apple bugs. The million dollar bounty is officially open to anyone. The new offer was made at the Black Hat convention in Las Vegas, the leading annual gathering of ... (view more)

Thu
08
Aug
John Lister's picture

'Contractors' Listen to Live Skype Calls

Microsoft contractors listen to some Skype calls to check the accuracy of translations, a whistleblower has revealed. Although Microsoft says it meets privacy laws, critics say its terms and conditions don't clearly warn users about this. The human ... listening takes place on some calls that use Skype's "automatic" real-time translation service. Until now, most users have assumed that the translation is done entirely by a combination of speech recognition and artificial intelligence to work out the context of a sentence and find the correct translations. While that's largely the case, a ... (view more)

Wed
07
Aug
John Lister's picture

Tech Giants Could Face Massive Fines

A proposed law would dramatically increase maximum fines that can be imposed on companies that break monopoly rules. Tech firms would be among the most likely to be affected in the admittedly unlikely event the law was enacted. The proposed bill ... would be known as the Monopolization Deterrence Act of 2019. It's designed to change the current system by which the maximum penalty for violating the main US antitrust law, the Sherman Act, is $10 million. That applies regardless of the size of the company or companies involved. Critics say such penalties are little deterrent to major companies, ... (view more)

Tue
06
Aug
John Lister's picture

Site Opens 100 Tabs to Fool Web Trackers

Mozilla has designed a site that will open 100 tabs at once, quite likely crashing a web browser. It's meant as a creative way to show how web tracking works. The stunt is based around cookies: small text files put onto a computer via the browser to ... customize an online session to a website. Third-party tracking cookies are then generated, which keep a record of the sites a user visits. This information is then used by ad servers to deliver targeted ads based on website history. "Track THIS" works by opening 100 tabs selected to represent a particular type of web user. The idea is that there ... (view more)

Thu
01
Aug
John Lister's picture

Windows Recovery Disk May Become Obsolete

Microsoft may be ending the need to have a physical disk to reinstall Windows 10. A 'Cloud Download' option could save time and hassle. At the moment, the main way to reinstall Windows is to use a recovery disk (or a copy of the relevant files kept ... on a hard drive or USB device.) That's got a few limitations, most notably that not everyone who gets a recovery disk with a new computer will be able to find it. Other problems are that recovery disks don't always have the drivers necessary to make sure Windows 10 works smoothly with a specific PC, and that the disks don't usually work well for ... (view more)

Wed
31
Jul
John Lister's picture

iPhone/iPad Users: Update Immediately

Google says it has found half a dozen major security flaws in Apple's iPhone messaging system. A new iOS update fixes five of the problems, but Google says one remains unpatched. The flaws were discovered by Google's Project Zero, a department that ... takes its name from the idea of "zero day" bugs . That's where would-be hackers become aware of a security issue before the relevant software developers are able to patch the bug. The zero day bugs are then exploited which often results in elevated privileged access levels given to a rogue program. The problems are with iMessage, the instant ... (view more)

Tue
30
Jul
John Lister's picture

Mega Hack Exposes Entire Population's Data

Financial records of almost every adult in Bulgaria have been stolen in a cyber attack. It's led to the unlikely situation of the country's leader reportedly exaggerating the attacker's skills. One man has been arrested following the attack, which ... looks to have involved unauthorized access to a database with records for every working adult in the country. That's almost five million people. There's some debate over exactly what was involved in the breach. Press reports suggest it not only included personal information such as date of birth and address, but also tax ... (view more)

Mon
29
Jul
Dennis Faas's picture

Explained: How do I Switch from GoDaddy? (Step-by-Step)

Infopackets Reader Sue P. writes: " Dear Dennis, I stumbled upon your website and read your article about GoDaddy email not syncing with Outlook. I have been dealing with a similar issue - GoDaddy emails are slow to send, and GoDaddy emails are slow ... to deliver. In fact, just about everything with GoDaddy is slow - yet, I'm paying over $300 a year to host my site at GoDaddy. They initially got me to sign up on $5.99 a month promise, but with all the extras I've agreed to, the costs add up quickly! Surely their must be a better choice. I was wondering can you give me a rough idea as to how do I ... (view more)

Thu
25
Jul
John Lister's picture

Robocall Bill Passes House

The House of Representatives has overwhelmingly backed a bill to crack down on unwanted robocalls. The bipartisan measure would increase regulatory power and make use of technology to tackle the problem. The proposed Stopping Bad Robocalls Act ... passed by 429 votes to 3. It follows a 97 to 1 vote in the Senate on a similar bill in May. It's now highly likely one of the bills will pass through both houses and become law. (Source: appleinsider.com ) Robocalls are automatically dialed phone calls. Because there's no need for a human to dial the number, both legitimate marketers and scammers can ... (view more)

Wed
24
Jul
John Lister's picture

Google Cracks Down on Rogue Browser Extensions

Google is cracking down on Chrome browser extensions that risk user privacy. The new policies err on the side of caution and follow a Washington Post investigation that claimed millions of users had data stolen by rogue browser extensions. A browser ... extension, also called an "add-on" in some browsers, is a third-party tool that users can incorporate into their web browser. It's designed to add extended functions to the browser, which then make using the browser and web much easier. Examples of extensions include: a password manager, which can remember user passwords and ... (view more)

Tue
23
Jul
John Lister's picture

Google's Updated Incognito Mode May Break Paywalls

Google is changing the way its "incognito" mode works. It says the move is necessary, but some news and magazine website owners are upset by the change. Incognito is Google's version of private browsing. Despite the name, it's mainly about privacy ... on the user's device: when in incognito mode, the local browser stops adding websites to its browsing history, which consists of a list of pages the user has visited and the searches they've carried out. The mode won't stop the activity being recorded by an Internet service provider (ISP) or by a local network administrator - something that has ... (view more)

Wed
17
Jul
John Lister's picture

New Router Exploit Auto-redirects to Rogue Sites

A security firm says hackers have hijacked 180,000 routers in Brazil alone so far this year. They target people who haven't changed the default login for the router's control system. According to Avast, there have been more than 4.6 million attempts ... to modify router settings remotely. Although the attacks were targeted at people using particular Internet service providers in Brazil, there's no reason the same tactics couldn't work elsewhere. The goal of the attacks is to change the DNS settings on a router. In simple terms, that's like the address book that a router uses to turn a website ... (view more)

Subscribe to Articles