access

Thu
09
Mar
John Lister's picture

Report: CIA Hacking Smart TVs, Listening In

Leaked documents suggest the CIA has a program for spying on people through home devices such as Smart TVs. However, it appears such attacks are highly targeted and often require physical access to the TVs. The claims come through a batch of 8,761 ... documents released by WikiLeaks, which says they come from the CIA. That agency has yet to comment on their authenticity and have not yet been independently verified. The documents are said to detail some of the tactics the CIA have used to improve digital surveillance. The overall message is that the agency appears to be concentrating more on ... (view more)

Thu
13
Oct
John Lister's picture

Social Media Monitoring Service Sold Data to Cops

A company accused of selling social media data to the police has been blocked from accessing some or all content from three major sites. Facebook, Instagram and Twitter made the move after complaints from the American Civil Liberties Union (ACLU.) ... According to the ACLU, Geofeedia markets its social media monitoring product to police forces as a way to monitor people who may be involved in protests. In one marketing message, a company representative specifically cited the use of the service during the high-profile unrest that followed the shooting of a man by police officers in Ferguson, ... (view more)

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Fri
01
Jul
Dennis Faas's picture

How to: Prevent Others from Reading Your Emails or Accessing Your PC (at Work)

" Dear Dennis, I work in an office on a desktop PC. If I am away from the PC, anyone in the office can hop onto my computer and access my emails because the 'offline access' to my emails feature is enabled. I have no idea how to turn it off! How can ... I prevent others from accessing my emails while I'm away? " My response: The quick and short answer is that disabling offline access to emails depends on the application or service you're using - most likely somewhere in your user account settings if you're using something like Gmail, or possibly in the "Tools -> Options" menu if you're using ... (view more)

Wed
08
Jun
John Lister's picture

TeamViewer Remote Access Customers Hacked

Management at TeamViewer, a remote access computer tool, have confirmed that a "significant number" of users have fallen prey to hackers. However, the company insists that all evidence suggests that there is no flaw in the system, but is instead ... pointing fingers at its users. TeamViewer allows users to login to a remote computer (even their own) from anywhere with an Internet connection. Once connected, users can operate the computer just as if they had physical access to the machine. The security for the system works in two ways: first, users get a reference number that identifies ... (view more)

Thu
25
Feb
John Lister's picture

FTC Cracks Down on Poor Router Security

ASUS has agreed to government supervision for 20 years after exaggerating the security of its routers. Officials say the company put hundreds of thousands of computers at risk. The company has agreed to a settlement in response to Federal Trade ... Commission (FTC) charges. The alleged breach of rules wasn't in the security flaws themselves, but rather that ASUS continuing to market the routers as "safe" was misleading to customers. Among ASUS's bold claims was that its routers could "protect computers from any unauthorized access, hacking, and virus attacks." This ... (view more)

Tue
09
Feb
John Lister's picture

Facebook's Free Internet Service Banned in India

The Indian government has banned Facebook from offering free Internet access in the country. Officials said the program breached net neutrality principles by favoring some sites over others. Since 2013, Facebook has offered a service called Free ... Basics in some nations where Internet access is unaffordable to large parts of the population. Most of these countries are in Africa and the Indian subcontinent. The service, offered in partnership with cellphone operators, gives users free access to data usage on a smart phone, which for many users will be their primary or only way of getting online ... (view more)

Thu
02
Apr
John Lister's picture

Survey: Are Smartphones a Vital Tool in 2015?

A newly-published study shows that the average person could manage without a smartphone for many common tasks. However, for a select group, smartphones are the only realistic option for accessing online services. The report comes from the Pew ... Research Center, which brought together several surveys, each of around 2,000 smartphone users. The results provide very differing meanings, depending on how they are viewed. (Source: pewinternet.org ) Most Tasks Achievable Without Phones On one hand, the study suggests smartphones are by no means vital for many everyday tasks. Participants were asked if ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Wed
18
Feb
John Lister's picture

Microsoft Cloud Gets Data Privacy Promise

Microsoft has signed up to an international standard for protecting customer privacy with online data. Among other measures, Microsoft promises to tell customers when the government demands access to their data. The company has followed ISO standard ... number 27018, which are guidelines set forth by the International Organization for Standardization. It's an attempt to set internationally recognized rules and regulations for the way "personally identifiable information" is handled in cloud services, and where data is stored or processed online rather than on the user's own computer ... (view more)

Pages

Subscribe to RSS - access