user

Mon
10
Feb
John Lister's picture

Banking Malware Relays Passwords to Cyber Criminals

Researchers have warned of a sneaky trick that uses malware to collect passwords for online banking. The "Metamorfo" malware disables autocomplete to force users to retype passwords that can then be hijacked. Metamorfo is familiar to security ... researchers, but has developed two new characteristics. The first is that it no longer targets only financial institutions in Brazil, but has expanded to other countries. The seconds is a new tactic to make it more effective. The malware works in a familiar fashion. It's distributed through a .ZIP file that's disguised as an invoice attached to ... (view more)

Thu
16
Jan
John Lister's picture

Chrome to Block Third-Party Cookies

Google says it will block third-party cookies, which can track Internet users in ways they don't expect. But it could be up to two years before the block is fully in place. A cookie is a small text file placed on a user's computer by a website. The ... idea is the site can check for the cookie later on and customize the users' web experience. Examples of 'legitimate' cookie use would be an online store that holds items in a virtual 'shopping basket', and a movie theater chain's site 'remembering' a user's location to automatically show them local listings. The more controversial variant is third- ... (view more)

Tue
24
Dec
John Lister's picture

Facebook Stops Using Phone Numbers for Advertisements

Facebook is to stop treating user's phone numbers as a way to target advertising and recommend friends. Critics said the practice undermined a key security measure. The company says it wasn't collecting the numbers directly from phones or the ... Facebook app. Instead, users provided the number when taking advantage of two factor authentication. With this set-up, it means that if a user tries to log in to Facebook on a new device or from a new location, Facebook sends a security code by text message to the number on file. The user then has to type the code in to Facebook before they can login ... (view more)

Fri
06
Dec
John Lister's picture

Mozilla Removes Security Extensions by Avast!, AVG

Mozilla has removed security tools from Avast and AVG from the Firefox extension store. It says the tools are collecting too much personal data about users. The extensions are third-party tools for the Firefox browser that add extra functionality to ... web browsing. In this case, the advertised purposes include highlighting and blocking malware that could be downloaded, and warning users when a page may be part of a phishing attack. That's where a user is tricked into typing in personal details into what they think is a legitimate site. Mozilla acted after online posts by Wladimir Palant, who ... (view more)

Thu
05
Dec
John Lister's picture

Android Malware Extracts Passwords from Any Legit App

Security researchers say a serious Android bug could let malware pose as a legitimate app and gain unwanted access to a phone's data and functions. The concept of the 'StrandHogg' bug has been known for several years, but now it's being actively ... exploited to target online banking. In simple terms, the bug has two unwanted effects: it can trick users into giving malware sensitive 'permissions' to access the phone, and it can hijack legitimate apps to trick users into handing over login details and sensitive information. Researchers at Promon explain the bug is with a security setting called ... (view more)

Thu
28
Nov
John Lister's picture

Firefox to Fight 'Fingerprinting' Tracking

Mozilla is to block "fingerprinting" tracking in the Firefox browser. It's an alternative tracking technique to cookies and doesn't require any consent from users. Most people know about cookies, which involves sites putting a small file on a ... computer to either identify a user for future visits or track their online activity. In most cases cookies both legally and practically need consent from the user before they can be issued. Fingerprinting is a more creative technique that doesn't require consent and has proven harder to block. It's all based around the fact that a website is able to ... (view more)

Wed
06
Nov
John Lister's picture

Firefox to Block Infuriating Notification Requests

Mozilla is reducing the likelihood Firefox users will be bothered by website notification requests. It will make browsing a lot less frustrating, but will upset some website owners. What are Website Notifications? Notifications in web browsers work ... in a similar way to notifications from apps on a mobile phone or tablet. As an example, a user of a streaming video site might agree to accept browser notifications. They could then get notifications whenever the site adds a new episode of a TV series they've previously watched on the site. On Windows 10, this notification might appear in the ... (view more)

Wed
16
Oct
John Lister's picture

Chrome to 'Freeze' Unused Tabs, Reduce RAM Usage

Google is introducing more options to deal with the Chrome browser using too much computer memory. It's implementing less severe options for users with multiple tabs open. The way Chrome was originally designed means every open tab uses up computer ... memory (RAM). That can mount up substantially if you are accustomed to having many tabs opened when Chrome is launched, or even with Chrome is idle. In turn this will significantly slow the computer down on older systems that don't have enough RAM to begin with. Since 2015 Chrome has had a feature called "Tab Discarding" that kicks in ... (view more)

Thu
26
Sep
John Lister's picture

Latest Internet Explorer Bug a Massive Risk

Microsoft has issued an emergency patch for Internet Explorer. In the most extreme circumstances, a user simply visiting a website could give a hacker complete remote control of a computer. Between Chrome's dominance and Edge becoming the default on ... new Windows machines, Internet Explorer is far from popular and is now used on around 8 percent of desktop computers. However, that still means around a hundred million machines could be affected by this bug. (Source: bbc.co.uk ) It's a sign of how serious the problem is that Microsoft has issued an emergency patch, or as it calls it, an out-of- ... (view more)

Mon
23
Sep
John Lister's picture

Google Responds to Device 'Eavesdropping' Claims

Google is making several changes to the way it handles audio collected from phones and smart gadgets such as the Google Home speaker. It follows revelations that humans listened to recordings collected by several tech giants. Amazon, Apple and ... Google were all hit by claims that they'd not done enough to make clear that staff or contractors listened to recordings to check the accuracy of automatic speech recognition. In several cases, human engineers heard sensitive material which appeared to have been collected unintentionally, rather than the user meaning to make a spoken query or request. ... (view more)

Pages

Subscribe to RSS - user