access

Thu
25
Feb
John Lister's picture

FTC Cracks Down on Poor Router Security

ASUS has agreed to government supervision for 20 years after exaggerating the security of its routers. Officials say the company put hundreds of thousands of computers at risk. The company has agreed to a settlement in response to Federal Trade ... Commission (FTC) charges. The alleged breach of rules wasn't in the security flaws themselves, but rather that ASUS continuing to market the routers as "safe" was misleading to customers. Among ASUS's bold claims was that its routers could "protect computers from any unauthorized access, hacking, and virus attacks." This ... (view more)

Tue
09
Feb
John Lister's picture

Facebook's Free Internet Service Banned in India

The Indian government has banned Facebook from offering free Internet access in the country. Officials said the program breached net neutrality principles by favoring some sites over others. Since 2013, Facebook has offered a service called Free ... Basics in some nations where Internet access is unaffordable to large parts of the population. Most of these countries are in Africa and the Indian subcontinent. The service, offered in partnership with cellphone operators, gives users free access to data usage on a smart phone, which for many users will be their primary or only way of getting online ... (view more)

Thu
02
Apr
John Lister's picture

Survey: Are Smartphones a Vital Tool in 2015?

A newly-published study shows that the average person could manage without a smartphone for many common tasks. However, for a select group, smartphones are the only realistic option for accessing online services. The report comes from the Pew ... Research Center, which brought together several surveys, each of around 2,000 smartphone users. The results provide very differing meanings, depending on how they are viewed. (Source: pewinternet.org ) Most Tasks Achievable Without Phones On one hand, the study suggests smartphones are by no means vital for many everyday tasks. Participants were asked if ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Wed
18
Feb
John Lister's picture

Microsoft Cloud Gets Data Privacy Promise

Microsoft has signed up to an international standard for protecting customer privacy with online data. Among other measures, Microsoft promises to tell customers when the government demands access to their data. The company has followed ISO standard ... number 27018, which are guidelines set forth by the International Organization for Standardization. It's an attempt to set internationally recognized rules and regulations for the way "personally identifiable information" is handled in cloud services, and where data is stored or processed online rather than on the user's own computer ... (view more)

Tue
17
Feb
John Lister's picture

Report: NSA Hacked Hard Drive Firmware for Spying

The US government has been accused of embedding spyware directly onto hard drives using secret manufacturer information. Russian security software manufacturer Kaspersky Lab made the claims, and stem from its efforts to find and eliminate malicious ... software. Kaspersky says officials appear to have only used the spyware to target specific, foreign-based individuals. Kaspersky says that the spyware is part of an operation controlled by the National Security Agency (NSA) , under the name Equation Group. It claims the NSA figured out how to put spying software in the firmware of hard drives made ... (view more)

Mon
02
Feb
Dennis Faas's picture

Can CryptoLocker Infect Shared Drives, Files, PCs?

Infopackets Reader Michael C. writes: " Dear Dennis, I have a USB drive attached to my router. This drive is shared by several computers through the router on my home private network. My question is: if one of my computers became infected by a file ... locking virus such as CryptoLocker , would the network drive or the connected computers become infected or encrypted? If so, is there a way to prevent this? " My Response: It is possible for a virus to self replicate and infect other computers on the network, but that depends on the type of virus. At the time of writing, CryptoLocker is not a self ... (view more)

Mon
19
Jan
Dennis Faas's picture

How to: Reset Any Password: Windows Vista, 7, 8, 10

Infopackets Reader 'ltb223' writes: " Dear Dennis, I have a Windows 7 Pro computer which I haven't used for a long time. Now I want to use it, but I cannot remember my password. It has only one user account, so I believe I need to reset the admin ... password. Is there anyway to recover the lost password or am I stuck with reinstalling Windows and losing all previous data and programs? " My response: It's possible to reset the admin password, or any user password using a special password reset 'trick'. It involves replacing the 'Ease of Access' program at ... (view more)

Tue
30
Dec
Brandon Dimmel's picture

Hacker Exposes Flaw in Fingerprint Security Systems

To many, the use of fingerprint readers as a way of password protection may represent the future of high-tech security. But a hacker has recently demonstrated that it's really not that difficult to bypass the security system -- all it takes, in ... fact, is a high-quality digital image. There's no denying that fingerprint passwords are becoming more and more common. They can be used to access PCs and thumb drives, but are becoming most prevalent in the smartphone world, where a quick dab of the finger gives one access to their mobile device. It seems like the perfect security system; ... (view more)

Mon
27
Oct
Dennis Faas's picture

How can I Recover Pictures, Videos from a Mobile Phone?

Infopackets Reader 'Lagrangestacy' writes: " Dear Dennis, How can I recover a video from today that was deleted from my phone? " My response: You didn't mention which phone you have, so I will provide general information on file recovery for mobile ... phones using a PC. First and foremost: mobile phones use either micro SD memory card to store data, or internal phone memory, or both. Depending on where the deleted video is stored, you can try to use your Windows PC to recover the files. You can either: a) Take out your micro SD card in your mobile phone and attach it to the ... (view more)

Pages

Subscribe to RSS - access