devices

Thu
07
Dec
John Lister's picture

YouTube Pulled From Amazon Gadgets

Users of some Amazon gadgets will have to look elsewhere for YouTube videos, after Google announced it will block the site from the devices. It's a tit-for-tat response to Amazon refusing to stock some Google hardware products. YouTube will be ... blocked from January 1st, 2018 on Amazon Fire TV devices, which include both table-top boxes and HDMI sticks. There's also an immediate block on YouTube on the Echo Show, which is a variant of the 'smart speaker' range that includes a screen. Google had already blocked YouTube on the Echo Show once but Amazon found a workaround. That workaround has now ... (view more)

Wed
06
Dec
John Lister's picture

New Windows 10 Laptops 'Could Run For Weeks'

Microsoft says new Windows laptops could last more than 20 hours of continued use without needing a recharge. Other changes mean its plausible the machines could be permanently connected to the Internet. The difference is all about the processors: ... the part of the computer that actually does the calculations which are at the heart of every computing activity. Usually Windows PCs run x86 processors (or compatible), most commonly produced by Intel and AMD. Now Microsoft is making a fresh attempt at Windows laptops that run the rival ARM processors, which are already used in the vast majority of ... (view more)

Tue
17
Oct
John Lister's picture

New Wi-Fi Crack can Intercept Your Data: What You Need to Know

One of the key security protections in WiFi has a serious vulnerability, a researcher has revealed. The exploit has to do with the protocol "WPA2" - currently considered the most secure protocol commonly used on WiFi routers and hotspots. Here's ... what you need to know about the WPA2 exploit. What's the problem and what does it affect? Security researcher Mathy Vanhoef has published a demonstration for what he's called "KRACKs," short for key reinstallation attacks. That's a way of exploiting a weakness in WPA2 (WiFi Protected Access II), the security system that is most ... (view more)

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Tue
18
Jul
John Lister's picture

Some Windows 10 PCs Could Lose Security Updates

Some computers only a few years old are reporting that they not longer support Windows 10. It's a badly-worded blunder for now, but could be the sign of a major security problem down the line. The problem is occurring when some computers try to ... install the Creators Update, the most recent widely-distributed major update to Windows 10. The message received is worded: "Windows 10 is no longer supported on this PC. Uninstall this app now because it isn't compatible with Windows 10." (Source: pcworld.com ) That's an extremely confusing and misleading message in several ways ... (view more)

Tue
14
Mar
John Lister's picture

Malware Preinstalled on Many Android Phones

Android phones from a variety of companies have reached business employees with malware already installed according to researchers. How and why it got there is not yet confirmed. The report comes from Checkpoint, a security company. It says it was ... examining devices used by staff at two businesses: one a "large telecommunications company" and the other a "multinational technology company." (Source: checkpoint.com ) While it's not unusual to find malware on employee phones during some checks -- that's partly the purpose of hiring services such as Checkpoint. ... (view more)

Mon
02
Jan
Dennis Faas's picture

How to Fix: Operation Requires Interactive Windows Station (Code 28) Error

Infopackets Reader Gord F. writes: " Dear Dennis, I recently installed Windows 10 on my PC. Everything has been working fine for over a year, however, all the sudden my Logitech webcam 300 stopped working with Windows 10. I thought perhaps I may ... need to reinstall the driver, so I went to Device Manager to locate the webcam but it is not there anymore. Instead, I see an 'Unknown device' and if I double click it, it says: 'The drivers for this device are not installed. (Code 28) This operation requires an interactive windows station'. I have absolutely no idea what that means. I tried ... (view more)

Thu
01
Dec
John Lister's picture

Android Malware Hits One Million Users

Bogus Android apps have helped hackers seize control of more than a million Google accounts in the past few months according to a security company. The apps have also been posting fake online reviews in the names of victims. The attack involves ... malware that's been dubbed "Gooligan." It's particularly concerning because of the sheer amount of personal data a hacker could theoretically access if they can use somebody's Google accounts, such as their email messages and any files stored on Google Docs and Drive. The malware affects devices running versions 4 and 5 of the ... (view more)

Thu
17
Nov
John Lister's picture

Smart Devices a 'Major Threat' when it comes to Cyber Warfare

A Harvard lecturer has warned Congress that only government regulations can prevent serious consequences from security attacks on the "Internet of Things." Bruce Schneier says there's little market incentive for buyers or sellers to fix a problem, ... should a problem arise. The Internet of Things (IoT) refers to the growing number of devices that can now be connected to the Internet, making them "smart devices". Rather than just computers and phones, the Internet of Things covers everything from thermostats to cars, often with the Internet connection allowing users remote ... (view more)

Thu
11
Aug
John Lister's picture

Google Says Android Bug Overblown

Google says a set of security flaws on Android devices may not be as serious as initially feared. It says 90 percent of devices should be largely immune from what's been dubbed the "Quadrooter" exploit. A security research company found the problem ... in software which works with processors manufactured by Qualcomm, which are used in an estimated 900 million Android devices. The bugs affect the communication between different actions (known as processes) running on the phone at the same time. The name of the exploit (Quadrooter) comes from the fact that there are four ... (view more)

Pages

Subscribe to RSS - devices