security

Wed
06
Feb
John Lister's picture

Google to Tell Users if Passwords Hacked

Google has launched a new tool to make it easier to know if a password has been hacked. But the way it works has raised some questions. The tool is called "Password Checkup" and is an extension for the Chrome web browser. It's designed to deal with ... details that are known to be part of a security breach, rather than offering more general advice such as using long passwords. If a user installs Password Checkup, Google will run a check whenever they log in to any site (not just ones Google operates). If it matches any entries on a database of known breaches, Chrome will display a ... (view more)

Tue
29
Jan
John Lister's picture

Malware Makers Set Sights On Motion Sensor

An extremely creative form of malware on Android devices uses motion sensors to help stay undetected. It's designed to combat one of the key methods used by malware scanning tools. Trend Micro says it found the malware hidden in two Google Play ... Store apps named "BatterySaverMobi" and "Currency Converter," which claimed to provide functions as their names suggest. (Source: arstechnica.com ) Once installed, the apps downloaded malware in the background, then used a fake system update message to trick the user into giving permission to install it. The malware, named " ... (view more)

Tue
15
Jan
John Lister's picture

Windows 7 No Longer Safe to Use in 2020 - Here's Why

January 2020 marks the end of extended support for Windows 7 from Microsoft. This means Windows 7 users have just one year left to upgrade to either Windows 8 or 10 (or an alternative), before their systems become a major security risk. Support for ... Windows 7 comes in a two-stage process. The first is known as mainstream support, which means the system is under warranty and Microsoft offers free technical support over the phone and its online forums. During this time, Microsoft also continues developing new features, and users can get hot fixes which patch any performance or security problems ... (view more)

Tue
01
Jan
John Lister's picture

Apps Share Data With Facebook, Even if No FB Account

20 popular Android apps are sharing user data with Facebook without permission, according to a new report. Privacy International says the data sharing happens even if the user doesn't have a Facebook account. The organization tested 34 apps, each of ... which have been installed at least 10 million times on Android devices. It looked at data that was transmitted through the Facebook Software Development Kit (SDK). The kit is a set of tools that are designed to help app developers coordinate their apps with the Facebook system. This is more commonly associated with retrieving data from ... (view more)

Mon
17
Dec
John Lister's picture

Android Phone Security Duped by 3D Printed Head

A 3D printed model head fooled facial recognition security features on four Android phones. It's not exactly a practical blueprint for thieves, but does show the security of such features varies dramatically between handsets. Thomas Brewster of ... Forbes commissioned a 3D model of his head that combined data from 50 cameras. It cost him a little over £300, equivalent to around $375 USD. (Source: forbes.com ) Angle ...<a href="/news/10470/android-phone-security-duped-3d-printed-head" class="more-link">view more

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Wed
31
Oct
John Lister's picture

Windows Defender Gets 'Sandbox' Protection

Microsoft is beefing up Windows Defender, the built-in antivirus and antimalware security tool in Windows 10. It's now using the same sandbox technology that's used in other tools, including some major web browsers. The concept of a sandbox is taken ... from the child's play area of the same name. It's a metaphor about the way the child has an area to play in freely and do what they like, but also has clearly defined boundaries. Fortunately, computer code tends to follow instructions better than a child told to stay in the sandbox. In computing terms, the sandbox is a concept about access that ... (view more)

Wed
29
Aug
John Lister's picture

Google Warns: Major Security Flaw in Fortnite Game

The makers of the hit video game "Fortnite" have called Google irresponsible for revealing a security flaw. The controversy follows Epic Games choosing not to use the Google Play store to distribute the game. Although it's free to download and play, ... Fortnite has proved hugely lucrative thanks to in-game purchases. Although 'buying' character costumes and animations doesn't affect gameplay, gamers - many of them children - have now spent more than a billion dollars. With so much money at stake, it appears Epic Games didn't want to go through Google Play for the Android version. Had ... (view more)

Wed
22
Aug
John Lister's picture

Microsoft Phasing Out Windows 8

Microsoft has announced several measures to slowly kill off Windows 8. It's targeting apps to try to persuade holdouts to upgrade to Windows 10. From October 31st, 2018, new apps designed for either Windows 8 or 8.1 on desktop or Windows Phone 8 on ... mobile devices can no longer be added to the Microsoft Store. From July 1st, 2019, Microsoft will stop sending app updates to Windows Phone 8 devices. The theory seems to be that developers will no longer have any reason to work on the platform and in turn it will become less and less attractive to users. Updates for existing Windows 8 and 8.1 ... (view more)

Wed
25
Jul
John Lister's picture

Microsoft: Phishing Scam Targets Politicians

Microsoft says hackers have targeted at least three candidates for Congress. Security experts say the group behind the attacks has been linked to Russia's intelligence services. The revelation came at the Aspen Security Forum in a speech from Tom ... Burt, Microsoft's head of Customer Security ... (view more)

Pages

Subscribe to RSS - security