John Lister

Thu
03
Jan
John Lister's picture

Islamic State Supporters Hijack Twitter Accounts

The way Twitter handles 'dormant' accounts has been hijacked to promote terrorist material, according to a report. It's all to do with the way Twitter associates its accounts with email addresses. The report comes from TechCrunch and follows a ... sudden upsurge in posts that don't seem connected to the account in question, but instead appear to come from members or supporters of Islamic State. (Source: techcrunch.com ) The problem appears to stem from the fact that Twitter doesn't delete accounts even if they aren't regularly used and may even have been abandoned by their original users. ... (view more)

Wed
02
Jan
John Lister's picture

Mozilla Accused of Running Ads On Firefox

Mozilla says a promotional message that appeared on Firefox's "new tab" page was not a paid ad. It says it was instead an experiment. A "new tab" page appears when the user either presses CTRL +T on the keyboard, or clicks the tab with a plus sign ... to start a new browser tab. The message appeared at the bottom of the screen on the new tab page and offered a $20 Amazon gift card to users who clicked on a link and then reserved a hotel room on Booking.com. It's reminiscent of a few years back when the new tab page was made up of several tiles, mostly linking to some of the ... (view more)

Tue
01
Jan
John Lister's picture

Apps Share Data With Facebook, Even if No FB Account

20 popular Android apps are sharing user data with Facebook without permission, according to a new report. Privacy International says the data sharing happens even if the user doesn't have a Facebook account. The organization tested 34 apps, each of ... which have been installed at least 10 million times on Android devices. It looked at data that was transmitted through the Facebook Software Development Kit (SDK). The kit is a set of tools that are designed to help app developers coordinate their apps with the Facebook system. This is more commonly associated with retrieving data from ... (view more)

Fri
28
Dec
John Lister's picture

Google Hunts Bogus Reviews

Google says it removed "millions" of bogus reviews and ratings for apps in a single week. It's tweaked its approach to detecting fake feedback to avoid mistakenly flagging legitimate reviews. The company says it wants to address three problems with ... user reviews in the Google Play store. One is to address reviews that are "genuine" but contain hateful or profane language or aren't relevant to the app in question. The second problem is "fake" ratings that are part of a campaign to manipulate the overall average score rather than being a real verdict by a ... (view more)

Tue
18
Dec
John Lister's picture

Chrome To Combat Sticky 'Back Button' Websites

Google is to fight back against websites that make it deliberately hard for users to leave their pages. It's tweaking the way the Chrome browser responds to the back button. The back button sounds like something simple that would intuitive take the ... user to the page they were on before navigating to the current page. However, the way it works has proven open to abuse. In reality the back button doesn't reverse the most recent "move" between pages. Instead it tells the browser to visit the most recent page in its history list. To the user it makes no difference, but to the browser it's ... (view more)

Mon
17
Dec
John Lister's picture

Android Phone Security Duped by 3D Printed Head

A 3D printed model head fooled facial recognition security features on four Android phones. It's not exactly a practical blueprint for thieves, but does show the security of such features varies dramatically between handsets. Thomas Brewster of ... Forbes commissioned a 3D model of his head that combined data from 50 cameras. It cost him a little over £300, equivalent to around $375 USD. (Source: forbes.com ) Angle ...<a href="/news/10470/android-phone-security-duped-3d-printed-head" class="more-link">view more

Thu
13
Dec
John Lister's picture

Android Ad Scam Hijacks Phones; Drains Data, Battery

22 Android apps are eating up data allowances to benefit scammers at the expense of phone owners, a security firm says. The apps are using smart phones to carry out fraud against online advertisers. Sophos says it's found 22 offending apps with a ... total of two million downloads. They are each described as offering simple games or basic utilities such as keeping the phone's flash activated to act as a flashlight. While they work as described, which helps get good online reviews and build credibility, the scam is happening behind the scenes. (Source: sophos.com ) The apps are used for click ... (view more)

Wed
12
Dec
John Lister's picture

New Features Revealed for Win10 April 2019 Release

Microsoft has revealed a few of the changes coming in future Windows 10 updates. They are mostly tweaks rather than new features, though that will likely reduce the chances of performance bugs. The changes have been unveiled as part of the "Fast ... Ring" of the Windows 10 Insiders Program. That means they're going out to the people in Microsoft's test program who've signed up to try out changes before anyone else, knowing it carries the biggest risk of new features not working well or even having bugs that affect Windows and other applications. New Windows 10 Changes Go Public April ... (view more)

Tue
11
Dec
John Lister's picture

MS: New Edge Rebuild to Support Chrome Extensions

Microsoft has confirmed Edge will now use the same code as Chrome . It's also said it plans to support Chrome extensions on Edge. The news bears out previous reports, though notably it appears Microsoft will stick with the Edge name for the revamped ... browser. That may be because it put so much effort into branding Edge as the replacement of Internet Explorer. It's all to do with rendering engines, the part of a web browser that actually turns the code of a web page into what the users sees on screen. Microsoft is ditching its own EdgeHTML and adopting "Chromium," an open source ... (view more)

Thu
06
Dec
John Lister's picture

Quora Site Hacked; Names, Emails and Passwords Stolen

Question site "Quora" has become the latest high-profile hacking victim, with details of more than 100 million users breached. Fortunately, the implications likely won't be as serious as some previous hacks. The site lets users post questions and ... then get answers from other users. A voting system means more helpful answers from its community means the best answers float to the top. Quora says its systems were accessed without authorization and that it discovered the breach on November 30, 2018. It says the exposed information included account information such as name, email address ... (view more)

Pages

Subscribe to RSS - John Lister