Security

Thu
22
Dec
John Lister's picture

Windows 8.1 End of Life: No More Security Fixes

Windows 8.1 will no longer receive security updates from next month. It is said to effect millions of users. Microsoft has reminded users that January 10th, 2020 is the "end of support" date for the system. That means it will continue to work, but ... users will no longer get any updates or fixes, whether for security or performance bugs. The deadline also means an end to technical support from Microsoft of any kind. (Source: microsoft.com ) The system has already past the mainstream support deadline in 2018. That's when Microsoft stopped adding any new features. No Pay-To-Secure Option Unlike ... (view more)

Wed
21
Dec
John Lister's picture

Government Apps Used 'Russian' Code

Two US government apps have been revealed as using code from a Russian company that falsely claims to be based in the US. It's also claimed one of that company's developers has a history with malware. The initial revelation came from Reuters which ... highlighted "thousands" of smartphone apps included code from a company called Pushwoosh. The apps included one for the Centers for Disease Control and Prevention and another used by the US Army. Both have now removed the code. (Source: reuters.com ) The Pushwoosh code lets apps put together profiles of users and send notifications without ... (view more)

Thu
15
Dec
John Lister's picture

Donut Theory Cracks Security Algorithm

A theory involving donuts has helped crack a proposed government security algorithm. It's nothing to do with distracting security guards, Better Call Saul-style, but rather advanced mathematics. Government agencies and others involved in security ... are constantly looking for new ways to encrypt data, with quantum computing seen as a potentially major threat. Most encryption methods used at the moment rely on length and complexity to deter brute force cracking techniques that simply try every possible decryption key. The idea is that it should take so many tries (on average) to get the right ... (view more)

Tue
13
Dec
John Lister's picture

Deepfake Videos Could Be Exposed

Intel claims it can spot 96 percent of "deepfake" videos. The trick appears to be tracking blood flow in the face. A deepfake is a more sophisticated version of the comparatively basic task of replacing one person's face with another in a video. ... Common uses include making the person appear to be saying something they never actually said (creating political distrust) or making it look like they performed lewd actions. The "deep" element comes from deep learning, where a computer program tries out and develops different tactics for performing a task better. In this case, the ... (view more)

Fri
02
Dec
John Lister's picture

Microsoft Defender May Hurt Performance

Microsoft Defender has come in last in two separate tests of Windows 11 security software. It's a surprise result given it generally did well on Windows 10. There's some comfort for Microsoft, however, as the nature of the testing means many users ... won't notice that much difference in practice. That's important given Microsoft Defender (previously Windows Defender) is built-in to Windows 11. The first rankings came from AV-Test, which describes itself as "The Independent IT-Security Institute." It ran a series of tests on 19 products using "realistic test scenarios" and "real-world threats." ( ... (view more)

Thu
01
Dec
John Lister's picture

Android Unlock Bug Fixed

Android users have been urged to check their phone has the latest security patches. It follows a researcher accidentally uncovering a significant flaw in the screen lock. The researcher discovered the problem on a Google Pixel 6 and replicated it on ... a Pixel 5. The problem appears to affect phones running Android 10 or later that use a SIM card, not just those made by Google. However, some reports suggest it doesn't affect Samsung handsets. The problem is with the personal unblocking key (PUK). That's a way to regain access to a handset that's been locked after forgetting the phone's passcode ... (view more)

Wed
30
Nov
John Lister's picture

One in 500 Passwords Is '123456'

"Password" and "123456" continue to battle it out for the worst password choice according to two annual studies. While this tells us very little about why users continue to use such weak passwords, there's some mixed news elsewhere. Several ... companies chase headlines each year by publishing lists of the worst passwords, meaning the ones that appear most frequently. The data source is usually a collection of stolen website login databases published online. Sometimes these are stored in plain text while sometimes cyber criminals have successfully cracked decryption. The ... (view more)

Fri
25
Nov
John Lister's picture

Government to Scan Every Internet Device

A government plans to scan every Internet-connected device in the country for vulnerabilities. The agency concerned insists it won't compromise privacy. The scan is the work of the United Kingdom's National Cyber Security Centre (NCSC). It says its ... looking for zero-day vulnerabilities, meaning security holes that hackers are actively exploiting before a fix is available. The NCSC says it will regularly scan all Internet connected devices based in the UK. It doesn't intend to access any data on devices but instead simply make a connection request. The scanning software will then log any ... (view more)

Wed
16
Nov
John Lister's picture

Adobe Wants $15 A Month To Use Some Colors

Adobe is charging an additional monthly fee to use particular colors in Photoshop. Some users have even seen parts of existing images turn black. The seemingly bizarre policy is all to do with Adobe's commercial agreement with Pantone, a company ... that offers services helping businesses create a consistent color scheme, such as branding. Historically, Adobe included more than 2,000 specific colors that are part of Pantone's "Color Matching Scheme". The idea of the scheme is to use a common reference that means any two uses of the color will look the same, no matter the origin or ... (view more)

Fri
11
Nov
John Lister's picture

Study: Microsoft Defender Too Reliant on Internet

A new study suggests Microsoft Defender's effectiveness varies dramatically on the setting. It's one of the best for online-based threats, but among the worst performers for offline-based threats. The study is from AV Comparatives, which runs ... regular tests on more than a dozen leading cyber security tools. (Source: av-comparatives.org ) The results for Microsoft Defender are particular noteworthy for two reasons. First, it's the default, built-in tool for modern versions of Windows, meaning hundreds of millions of people use it. Second, it's often argued that Defender does a good enough job ... (view more)

Pages

Subscribe to RSS - Security