hackers

Fri
09
Apr
John Lister's picture

500M Phone Numbers Exposed in Facebook Leak

A data leak has exposed the phone numbers of an estimated 500 million Facebook users. The data comes from a breach in 2019, but has just been made public. According to Facebook, the breach was "found and fixed" in 2019, which has raised some ... eyebrows given the company never warned users their details may have been compromised. It argues the data wasn't hacked but rather "scraped" from publicly accessible information through a bug in its feature that lets users find the Facebook accounts of people in their phone contacts. That may not be enough to satisfy data protection officials in several ... (view more)

Tue
12
Jan
John Lister's picture

100M Users Still Using Windows 7

As many as 100 million PCs could still be running Windows 7 according to a newly-published estimate. That's despite Microsoft withdrawing support for the 11-year old system last year. The estimate comes from Ed Bott of ZDNet and is based on data ... published at analytics.usa.gov. That brings together site visitor data from most US government agencies. It means the figures will primarily represent visitors from the United States. (Source: zdnet.com ) Bott notes that across the agencies, 8.5 per cent of visitors in the past 90 days were running Windows 7 and 3.4 percent running Windows 8 or 8.1. ... (view more)

Wed
14
Oct
John Lister's picture

Microsoft, Military Tackle Bonet Preceding Elections

Microsoft says it has disrupted "one of the world's most persistent malware operations." The action against "Trickbot" reportedly involved working with the US military. Trickbot is a botnet , created by infecting computers with malware then ... hijacking and combining their resources for further malicious activity. The operators largely built it using bogus emails that tricked users into opening a file attachment or clicking a link that downloaded and installed malware. The uses of Trickbot have included stealing login details such as online banking credentials; accessing sensitive data; and ... (view more)

Tue
08
Sep
John Lister's picture

1/4 of PCs Running Win7 Despite Security Risks

More than one in four computers are running an unsupported version of Windows according to the latest monthly estimates. Around one in 80 machines are still running Windows XP, which was first released 19 years ago. The stats, spotted by TechRadar, ... come from Net Market Share. That's a company which provides statistics and analysis to websites. As part of this work, it's able to track the operating systems of sites that visit its clients sites. (Source: techradar.com ) Net Market Share believes it has data from enough sites to make reliable estimates for the Internet as a whole. If anything, ... (view more)

Wed
12
Aug
John Lister's picture

1 Billion Android Phones At Risk due to CPU Flaw

Security researchers spotted a major flaw in a processor that's in more than a billion Android phones. It's been fixed now, but highlights the importance of a couple of key security measures users should take. Researchers at Check Point say they ... spotted the errors on a processor from Qualcomm that's used on more than 40 percent of cellphones. The processor is known as a "system on a chip" (SoC) because it combines hardware and software in a single unit. The processor controls some key functions on a phone including charging, video and audio. Because it's a system on a chip, it runs partially ... (view more)

Wed
22
Jul
John Lister's picture

Smart Devices May Be Governed by Laws

Politicians on both sides of the Atlantic are considering laws to tighten cyber security for the so-called Internet of Things (IoT). The rules would cover devices that aren't traditional computers or phones but still connect to the Internet. The ... United States Congress is considering the Internet of Things Cyber Security Improvement Act. It's been examined by a Senate committee and is currently awaiting a date to be examined by the Senate as a whole. However, there's no guarantee it will be heard before the end of the year and newly elected or re-elected Senators taking their seats. Agency To ... (view more)

Wed
15
Jul
John Lister's picture

Windows 10 May Get Key Security Boost

Microsoft is testing a new Windows 10 security measure that could neutralize a malware technique. It's called Kernel Data Protection and will protect part of a computer's memory from tampering. The idea is to protect two key software parts of a ... computer: the operating system kernel and drivers. The kernel is the most central part of a system and acts a little like a central command point, deciding what the computer does at any precise moment. Meanwhile, drivers control the way the operating system communicates and interacts with hardware devices. Within the computer's memory, the kernel is ... (view more)

Mon
25
May
John Lister's picture

Chrome to Encrypt DNS Lookups: What it Means

Google is increasing privacy on Chrome with a change to the way it connects users to websites. But businesses will be able to disable the move so they can keep tabs on staff. The change is to the way Chrome connects with Domain Name Servers (DNS), ... which act a little like a telephone directory for the Internet. A DNS takes a website address that a user types into their browser and finds the matching IP address, which identifies the specific connection to the device such as a server (or service) that physically stores the website's files. In the past, the connection between Chrome and a DNS was ... (view more)

Tue
28
Apr
John Lister's picture

Major Antivirus Flaw Deletes Files, Corrupts Windows

A security company says it found a simple way to turn antivirus software into a weapon for attackers. Most major manufacturers have now fixed the problem, but it's a reminder to keep such software updated. The discovery by Rack911 Labs effectively ... meant that a hacker could force the antivirus software to delete files on a computer. That would mean the hacker would need to have gained access to a computer first - whether internally on a network, or remotely using malware. The exploit is based on one of the most fundamental actions of any antivirus software: they scan files, check if they are a ... (view more)

Tue
21
Apr
John Lister's picture

Android Store Hacked; Up to 40M Accounts Leaked

A third-party Android app store has been hit by a big data breach. Aptoide users who registered between 21 July 2016 and 28 January 2018 may be affected. Aptoide works in a same way as Google's own Play app store, but isn't subject to its content ... regulations or security vettings. As with all third-party stores, users must confirm they accept security risks when installing apps from it. A hacker has published data from 20 million users and claims to have details of another 19 million users altogether. That's a big chunk of the 150 million people Aptoide claims have used its service at some ... (view more)

Pages

Subscribe to RSS - hackers