security

Thu
31
Dec
John Lister's picture

9 Million At Risk from Browser Security Tool

A popular antivirus browser extension has been labeled as a security risk by Google. The tool in question is called Web TuneUp and is a browser extension by AVG; in this case, the problem involves Web TuneUp and the Chrome Browser, but the threat ... itself likely includes other browsers as well. Web TuneUp works by validating links that appear on a web browser page, such as on a search engine results list. It then warns the user if a link points to a page that could compromise security. It's arguably overkill, given that Chrome includes similar tools - plus the fact that Google itself ... (view more)

Wed
30
Dec
John Lister's picture

MS Defends Windows 10 Policy to Copy Hard Drive Keys

Microsoft has confirmed it automatically uploads Windows 10 disk encryption keys to its servers. The company says it was a deliberate decision based on weighing up the worst case scenarios. The encryption key in question is not related to logging ... into and running Windows itself. Instead its an encryption of the entire hard drive of the device running Windows 10. This means that if somebody physically steals your computer, they can't make any sense of the data, even if it's been copied to another device (using a disk image backup, for example). Encryption Key Would Help Computer Thieves ... (view more)

Wed
23
Dec
John Lister's picture

Google Testing New Password-Free Login System

Google is testing a login method that doesn't require a password. The problem is that the method doesn't necessarily add any convenience and isn't as secure as it could be. Reports of the new method have come from a user at the discussion site ... Reddit, who was invited to test the new system. As part of the test, the user must have a smartphone registered. (Source: reddit.com ) The user posted screenshots which show the normal login screen but only asking for an email address (the Google equivalent of a user name) and not for a password. Code Sent To Mobile Screen The screenshots ... (view more)

Wed
09
Dec
John Lister's picture

New 'Bootkit' Malware Sidesteps Security Software

A newly-identified piece of malware has achieved arguably the ultimate goal of cybercriminals. "Nemesis" is able to infect a Windows computer before the operating system is loaded. The malware is a particularly nasty form of a rootkit . That's ... software which is able to inappropriately access some of the core components of a computer (both hardware and software), often disguising its actions. A rootkit is a serious problem because it's often completely undetectable, which means that it can easily override antivirus software to carry out malicious tasks. In this case, the Nemesis ... (view more)

Fri
27
Nov
Dennis Faas's picture

How to: Safely Disable Windows 10 Tracking

Infopackets Reader Tom H. writes: " Dear Dennis, I'm currently running Windows 7 and would like to upgrade to Windows 10. However, the one thing I'm greatly concerned about is how Windows 10 will track and share my information online. In your ... opinion is Windows 10 worth it or should I stick with Windows 7? " My response: That's a good question, and there a number of things to consider. Updates for the Life of the Machine In my opinion, it's definitely worth the upgrade to go from Windows 7 or 8 to Windows 10 simply for the fact that you will be running the latest operating system from ... (view more)

Thu
26
Nov
John Lister's picture

FCC to Tighten Online Privacy and Security Oversight

The Federal Communications Commission (FCC) has hired a noted privacy campaigner to investigate Internet providers. It's part of a joint move with the Federal Trade Commission (FTC) to strengthen security and privacy measures in the communications ... industry. Jonathan Mayer has been hired as the FCC chief technologist in its enforcement division. In effect, he'll deal with the practical issues involved in deciding whether or not a company is following the law. It's a strong sign the commission intends to get tougher on company violations. New Appointee Exposed Google Trickery Mayer ... (view more)

Thu
22
Oct
John Lister's picture

Privacy vs Security: Should Apple have a Back Door?

Apple has told a court that it's impossible to access data in most iPhones and iPads without a password. It could lead to a legal standoff in the 'security versus privacy' debate. The comments came in a case involving a recently-seized iPhone. The ... United States Justice Department is unable to access the contents of the phone and has therefore asked the court to order Apple to help them gain access. In this specific case however, Apple is physically able to access the device's data because the phone itself is running a susceptible operating system (iOS version 7). Nonetheless, Apple has ... (view more)

Thu
15
Oct
John Lister's picture

Google Simplifies Web Browser Security Warnings

Google is to tone down security warnings for users of the Chrome browser. It believes the move won't increase user risk and may instead encourage websites to improve security. The change involves the way secure websites appear in the address bar in ... Chrome. At the moment, a website in Chrome will appear with one of four icons to the left of the address to indicate whether or not it is secure: A plain white 'blank page' icon indicates an ordinary http site, meaning there's no encryption of data passing back and forth between the website and the user's computer. A green ... (view more)

Wed
02
Sep
John Lister's picture

Microsoft May Reveal More About Windows 10 Patches

Microsoft says it may revise its policy of giving little to no information about the contents of updates to Windows 10. For now at least, any details would only go to business customers. As previously discussed, Windows 10 marks a departure from the ... traditional monthly release of updates , with the only exceptions being one-off security patches for serious bugs in the wild which are usually being exploited by hackers. Under the new system, Microsoft quietly sends out updates both for security fixes and enhancements to features, as and when they are ready. That's accompanied by a change in ... (view more)

Wed
26
Aug
John Lister's picture

Should Companies be Accountable for Leaked Customer Data?

Companies that don't do enough to protect customer data against hacking are more likely to be sued, thanks to a court ruling this week. A federal appeals court rejected an argument that the Federal Trade Commission (FTC) overstepped its powers by ... suing a company over three hacking incidents. The company is question is the Wyndham Hotel chain, in which 619,000 customers' credit card data was leaked. According to the FTC, Wyndham failed to use suitably complex login details on accounts, stored card data on its servers in unencrypted form, and did not use adequate firewalls to protect the ... (view more)

Pages

Subscribe to RSS - security