security

Tue
17
Oct
John Lister's picture

New Wi-Fi Crack can Intercept Your Data: What You Need to Know

One of the key security protections in WiFi has a serious vulnerability, a researcher has revealed. The exploit has to do with the protocol "WPA2" - currently considered the most secure protocol commonly used on WiFi routers and hotspots. Here's ... what you need to know about the WPA2 exploit. What's the problem and what does it affect? Security researcher Mathy Vanhoef has published a demonstration for what he's called "KRACKs," short for key reinstallation attacks. That's a way of exploiting a weakness in WPA2 (WiFi Protected Access II), the security system that is most ... (view more)

Thu
05
Oct
John Lister's picture

Yahoo Admits: All 3 Billion Email Addresses Hacked

Yahoo has admitted that a hacking incident in 2013 affected three billion user accounts. That's three times more than it originally disclosed and means every account was affected. The incident was one of two Yahoo hacks revealed last year. The ... first, announced in September, involved 500,000 accounts being hacked in 2014 . The second, announced in December, was said to have involved a hack of a billion accounts in 2013 . It's the 2013 attack that Yahoo now says it believes "all Yahoo user accounts were affected." It's keen to stress that it only recently discovered that the number was bigger ... (view more)

Tue
05
Sep
John Lister's picture

Pacemakers 'Recalled' Amid Hacking Concerns

Around 465,000 pacemakers have been 'recalled' over hacking fears. However, the St Jude Medical brand devices will be patched with a software update rather than removed and replaced. The pacemakers are radio controlled to allow doctors to alter the ... specific rhythm they aim for when regulating a heart beat. This radio control means doctors can adjust to the patients changing needs without the need to remove the pacemaker for alterations. That's important as the surgery for such a removal is inherently risky. No Signs Of Hack Attacks While the precise details haven't been revealed for obvious ... (view more)

Thu
31
Aug
John Lister's picture

700 Million Email Accounts Hijacked by Spammers

More than 700 million email addresses and passwords have been leaked online. While many are bogus, enough appear to be genuine that security experts have advised users to change their email passwords. The collection of account details does not ... appear to have been used for identity theft or other fraud. Instead, the collection has been marketed as a way to send spam messages. The idea is that spammers can login to the compromised accounts in order to send their unsolicited emails. This effectively flies under the spam radar, as most spam comes from IP addresses without any reputation. In this ... (view more)

Thu
10
Aug
John Lister's picture

Facebook Exec: Security Researchers Not Doing Enough

According to Facebook's head of security Alex Stamos, the security industry needs to do more to solve problems that affect ordinary people in their everyday lives. He says researchers are often too obsessed with technical detail because they lack ... empathy. Stamos spoke at Black Hat, a conference that brings together security professionals, researchers, self-described hackers and those with an interest in the topic. (Source: bbc.co.uk ) He said the security community had proven justified in many of its warnings about flaws in systems and networks, but that it hadn't done enough to find ... (view more)

Thu
06
Jul
John Lister's picture

iPhones Could Get Facial Recognition

Apple is working on facial recognition as an iPhone security measure. It's said to be have it ready for this year's iPhone 8, but may wait until the feature has been fully tested and complete. The idea is to replace fingerprint scanning for ... unlocking the phone. It's not yet confirmed if and when the facial recognition would be extended to other uses, such as using Apple Pay rather than have to type in card details or a PIN code. According to a Bloomberg source, the face unlock takes less than half a second to scan a face, confirm its identity and unlock the phone. The feature ... (view more)

Wed
14
Jun
John Lister's picture

Patch Your PC: Yet Another Massive Exploit Discovered

Microsoft has issued three updates to fix flaws in older, unsupported versions of Windows. It's an unusual move that follows the discovery that both the National Security Agency (NSA) and outside hackers are exploiting the flaws , similar to the one ... that allowed the WannaCry Ransomware worm to spread just a few weeks ago. The updates cover both Windows and Windows Server editions going right back to XP . They'll be issued through the usual automated updates, which means people on Windows 8.1 and later shouldn't need to do anything. Those on earlier systems may need to manually ... (view more)

Fri
09
Jun
Dennis Faas's picture

Explained: How to Know if Windows Updates are Working (and What to Do if They Aren't)

Infopackets Reader Howard N. writes: " Dear Dennis, In regard to the WannaCry Internet worm which can infect all Windows PCs that have not yet been patched using Windows Updates - how can I make sure that my Windows Update is operating properly, and ... that I am receiving my updates automatically? I enjoy your newsletter - please keep it up and have a nice day! " My response: Generally speaking: you should be able to go to the "Windows Update" service within Windows, and it should tell you when updates were last received. If you haven't received any updates for a while - or if you have your ... (view more)

Thu
25
May
John Lister's picture

Eye and Voice Logins Compromised

Two biometric security measures have come into question after reporters and researchers claimed to have overcome them. A phone's iris recognition and a bank's voice log-in both appear to be less than perfectly secure. The Samsung Galaxy S8 - ... arguably the most high-profile and hyped phone currently running the Android system - includes an option to unlock the phone by simply looking at the camera. In a similar way to fingerprint recognition, it works on the idea that the patterns in the eye's iris are unique. Samsung described these patterns as "virtually impossible to ... (view more)

Tue
16
May
John Lister's picture

WannaCry Ransomware Worm: What You Need to Know

Beginning Friday, May 12, 2017, reports surfaced of a new Internet worm capable of infecting Windows machines instantaneously. The worm has been dubbed "WCRY" or "WannaCry" because of its malicious intent to install ransomware on the target machine. ... The Internet worm was made possible because of a leaked NSA (national security agency) document which essentially explained how to carry out the exploit. In this case, the malicious software locks computers such that their files are encrypted and cannot be accessed unless the victim pays a ransom (and the culprits then stand by ... (view more)

Pages

Subscribe to RSS - security