access

Thu
12
Mar
John Lister's picture

New Ransomware Exploits Excel Format

A new ransomware variant takes advantage of a Microsoft Excel feature. It's a good reminder to keep security software up-to-date. The variant has been reported by security company Lastline. It involves a known ransomware called Paradise that ... operates in the familiar fashion: the attackers find a way to get remote access to a computer then encrypt files and demand a fee to restore access - sometimes in the tens of thousands of dollars, or much higher. In this case, the attackers try to trick victims into opening a file attachment that creates the opening for accessing the machine. The ... (view more)

Mon
24
Feb
John Lister's picture

Gas Pipeline Shut Down After Ransomware Attack

Ransomware forced an unplanned shutdown of a US gas pipeline for two days. It's not yet clear if the attackers intended to have that effect. The full details, including the identity of the pipeline and its operators, have been kept under wraps. The ... only official information that's been made public comes from a security alert bulletin by the Department of Homeland Security (DoHS). (Source: us-cert.gov ) The attack started as an all-too-familiar "spear phishing" attack. That's a deliberately targeted email that tries to fool somebody (that typically works for a corporation) into clicking on a ... (view more)

Wed
22
Jan
John Lister's picture

Apple Drops Plan to Tighten iCloud Encryption

Reports suggest that Apple has been pressured by the FBI to drop plans to improve the security of its customer backups. The plan was to better encrypt backups on the iCloud service. iCloud serves two purposes: it's a way for Apple users to store ... data and documents online and access them from anywhere (from any Apple device) with a password; it's also a way to automatically backup the contents of iPads and iPhones. Data from the iCloud is stored on Apple servers in an encrypted format, which means that if somebody gained access to the files (either through a remote hack, or a physical breach ... (view more)

Wed
15
Jan
Dennis Faas's picture

How to use Smart DNS to Access Geo-Restricted Content

Have you ever tried to watch a trending online video, only to find that it's not available in your region? A Smart DNS proxy is a solution can help. Here's how it works: A Smart DNS proxy can be used to unblock geo-restricted content from around the ... world. It does this by collecting data related to your geographical location and re-routing it through a computer server located in a region where access to the blocked content is permitted. They do this by changing your Domain Name System (DNS) settings so that the websites you visit think you're in a location where you are permitted to access ... (view more)

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Tue
26
Mar
Dennis Faas's picture

How to Fix: Permanently Disable WiFi on Windows 10

Infopackets Reader 'JustRosy' writes: " Dear Dennis, I have a laptop that I use daily, and for security reasons I want my WiFi permanently disabled in Windows 10 . Unfortunately my Windows 10 laptop WiFi does not have an 'on / off' switch which ... would disable my WiFi permanently. Instead, I have been using Windows 10 "airplane mode" to disable the WiFi, but this doesn't work 100% of the time because my WiFi seems to activate spontaneously. I am super paranoid about having a WiFi connection because I don't believe there is a 100% secure WiFi, and therefore I don't ever want to use WiFi on my ... (view more)

Thu
07
Feb
John Lister's picture

Security Researcher Refuses to Share Bug with Apple

A security researcher says he's found a major security flaw in the Mac's password storage tool. But he's refusing to publish the details as a protest against Apple's "bug bounty" program. Linuz Henze has produced a video showing what he calls an ... exploit of the Keychain feature in MacOS Mojave, the current edition of the operating system for Mac computers. Keychain is an application on Macs that lets users save passwords for online accounts and digital certificates so that they don't have to type them in again. Users can also open Keychain and access a full list of passwords. Normally every ... (view more)

Wed
31
Oct
John Lister's picture

Windows Defender Gets 'Sandbox' Protection

Microsoft is beefing up Windows Defender, the built-in antivirus and antimalware security tool in Windows 10. It's now using the same sandbox technology that's used in other tools, including some major web browsers. The concept of a sandbox is taken ... from the child's play area of the same name. It's a metaphor about the way the child has an area to play in freely and do what they like, but also has clearly defined boundaries. Fortunately, computer code tends to follow instructions better than a child told to stay in the sandbox. In computing terms, the sandbox is a concept about access that ... (view more)

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Wed
10
Oct
John Lister's picture

Google+ Social Network Bites Dust amid Data Breach

Google is to shut its social network Google+. Although the service was something of a flop, the closure is more to do with a massive data exposure. Google+ launched back in 2011 and was one of several attempts by the company to compete with the ... likes of Facebook. Its main selling point was the concept of Circles, which meant that users weren't restricted to sharing posts and updates with a fixed set of friends. Instead, they could write a post that was seen by a particular group, such as work colleagues or people with a shared hobby. Facebook does have such a feature, but it's not as ... (view more)

Pages

Subscribe to RSS - access