access

Thu
26
Oct
John Lister's picture

Amazon Couriers Could Open Your Front Door for Delivery

Amazon wants customers to let couriers have an electronic key to get inside customer homes for deliveries. The Amazon Key program also appears to be a way to promote customers buying security cameras and smart locks. The Amazon Key feature is only ... available to customers in the Amazon Prime subscription program, which includes free home delivery and access to streaming video. They'll also need a compatible camera and smart lock, with Amazon bundling the two devices together for $250 including installation. The smart lock technology can be added to an existing standard deadbolt, meaning a ... (view more)

Mon
23
Oct
Dennis Faas's picture

How to Fix: Make Windows 10 Stop Flashing on Sound

Infopackets Reader Steve T. writes: " Dear Dennis, I am using a Windows 10 PC. This past weekend, my grandchild made some changes to my PC and now every time there is sound, the screen flashes. I have searched and searched how to fix this but I am ... cannot seem to find a solution. Can you tell me how I can make windows 10 stop flashing on sound? " My response: I have not heard of this issue before but suspected it may have something to do with the "Ease of Access" mechanism which has been built into Windows as far back as Windows XP. According to Microsoft, Ease of Access "helps make your PC ... (view more)

Thu
14
Sep
John Lister's picture

Windows 10 Gets Privacy Boost

Microsoft is to give Windows 10 users more details about exactly what an app is able to do on their computer. It's a similar security measure to that available on some mobile device apps. Until now, apps only usually have to get a Windows user's ... permission when they want to access location data, for example in a mapping tool. That's changing with the 2017 Fall Creators Update, the next major twice-yearly feature update for Windows 10. Microphone and Webcam Access Need Permission The change means apps will need the user's permission to access key hardware components on the computer such as a ... (view more)

Tue
04
Jul
John Lister's picture

Windows 10 Gets Anti-Ransomware Feature

Microsoft is adding a new feature to Windows 10 that could make it harder for ransomware to lock up files. It could be useful, but is certainly not a complete defense. The feature, called "Controlled Folder Access," is part of the Windows Defender ... security tool and is already being tested by users who've volunteered for advanced access to Windows 10 updates. The idea is that specific folders can be protected which means that only specified applications or programs can create, alter or delete files in those folders. This includes encrypting the files, which is the key tactic ... (view more)

Tue
09
May
John Lister's picture

Phishing Scammers Try New Twist

An estimated one million people around the world received a recent phishing email, though it only posed a risk for around an hour before Google stepped in to stop the scam in its tracks. Victims of the scam may have inadvertently given attackers ... control of their email accounts. The attack involved a bogus email claiming that a contact tried to share a document with the recipient using Google Docs. While only a small proportion of people use Google Docs, the attackers appear to have been playing the numbers game. Attackers Accessed Emails and Contacts Unlike most phishing scams, the attackers ... (view more)

Wed
12
Apr
John Lister's picture

Researchers: Phone Tilt Could Reveal PIN

Motion sensors in smartphones could give away your lock code to hackers according to new research. But practical limitations mean related attacks might have to be specifically targeted. Researchers at Newcastle University explored the idea that ... tools such as accelerometers, gyroscopes, compasses and GPS chips in phones could reveal more detail than users realize. The tools are used for a variety of functions such as location tracking, fitness tracking and gesture control such as a user turning a phone face down to instantly switch it to "do not disturb" mode. Their theory was that ... (view more)

Wed
29
Mar
John Lister's picture

Docs.com Users Warned to Check Sharing Settings

Users of Microsoft's Docs.com have been warned to review security settings on their account. Researchers found it was all too easy to search and find personal data contained in documents mistakenly made public. Docs.com is designed to make it easy ... to share documents with other users over the Internet, including PDF files and those in Office formats, regardless of the device and operating system they are using. The site includes a search feature that lets a user look for text in any document on the service to which they have access - something that's designed to make it much easier ... (view more)

Thu
09
Mar
John Lister's picture

Report: CIA Hacking Smart TVs, Listening In

Leaked documents suggest the CIA has a program for spying on people through home devices such as Smart TVs. However, it appears such attacks are highly targeted and often require physical access to the TVs. The claims come through a batch of 8,761 ... documents released by WikiLeaks, which says they come from the CIA. That agency has yet to comment on their authenticity and have not yet been independently verified. The documents are said to detail some of the tactics the CIA have used to improve digital surveillance. The overall message is that the agency appears to be concentrating more on ... (view more)

Thu
13
Oct
John Lister's picture

Social Media Monitoring Service Sold Data to Cops

A company accused of selling social media data to the police has been blocked from accessing some or all content from three major sites. Facebook, Instagram and Twitter made the move after complaints from the American Civil Liberties Union (ACLU.) ... According to the ACLU, Geofeedia markets its social media monitoring product to police forces as a way to monitor people who may be involved in protests. In one marketing message, a company representative specifically cited the use of the service during the high-profile unrest that followed the shooting of a man by police officers in Ferguson, ... (view more)

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Pages

Subscribe to RSS - access