access

Mon
14
Mar
Dennis Faas's picture

How to: Reset Any Password: Windows Vista, 7, 8, 10

Infopackets Reader 'ltb223' writes: " Dear Dennis, I have a Windows 7 Pro computer which I haven't used for a long time. Now I want to use it, but I cannot remember my password. It has only one user account, so I believe I need to reset the admin ... password. Is there anyway to recover the lost password or am I stuck with reinstalling Windows and losing all previous data and programs? " My response: It's possible to reset the admin password, or any user password using a special password reset 'trick', known as the 'utilman' and 'sticky keys' exploit. This exploit ... (view more)

Wed
15
Dec
John Lister's picture

Android Scammers Try New Tactics

Google has cracked down on a key method that scammers used to distribute Android malware through the Play app store. But like a game of whack-a-mole, the scammers are adjusting their tactics for greater success. The Google change is to the way it ... handles accessibility tools on Android devices. These include screen-readers, voice input systems and other modifications for users to interact with the device. Such tools often need access to key components such as the camera, microphone or speakers, access that can be abused by malware. Google relaxes the security and permissions system on such ... (view more)

Wed
01
Dec
John Lister's picture

Android 12 Brings Incredibly Useful Privacy Tools

The latest version of Android adds several new privacy features. However, users may need to make some manual tweaks to take full advantage. The changes come in Android 12 which is rolling out to newer phones at the moment. Older models will either ... get it later on or will never be able to get it, depending on the manufacturer. The biggest change is more information about the permissions system. That's the set-up by which users don't have to give an app complete access to the hardware and software on their system. Instead they can individually grant or restrict individual permissions, each of ... (view more)

Fri
26
Nov
Dennis Faas's picture

How Thieves Use The Dark Web to Steal Your Data

We live in the age of technology where every day is full of advancements that make our lives easier. At what cost, though? Our Internet security is constantly under fire by hackers and cyber criminals using these technological advances to their ... gain. Through the dark web, a virtual underworld full of criminal activity that can be accessed using specific tools, such activity is made possible. However, many people aren't sure what the dark web actually is. According to Business Insider, it's "defined as all content hosted on darknets, or online networks that require a specific browsing software ... (view more)

Tue
10
Aug
John Lister's picture

Report Condemns Government Cyber Security

A Senate committee has slammed cyber security in eight federal government agencies. The committee said most were failing basic security standards and had shown minimal improvements since a previous report. The report comes from the Committee on ... Homeland Security and Governmental Affairs. It followed up on a similar report from another committee in 2019. Both reports looked at issues including: Whether the agencies adequately protected personal information. Whether they kept track of the various IT equipment and systems they used. Whether they installed security patches quickly enough. Whether ... (view more)

Wed
19
May
John Lister's picture

Bloggers Accused of Hacking for Opening Dropbox Link

A Californian city will pay $350,000 to two men it falsely accused of hacking its Dropbox account. Officials in Fullerton, California had actually sent a link that granted the access. The case involves two bloggers, Joshua Ferguson and David Curlee, ... who wrote about local government and regularly requested documents under public record laws. As some of these files were very large, officials would often upload them to a Dropbox folder and provide a link granting access. However, one such response in 2019 also mistakenly included a link giving access to a separate folder that included documents ... (view more)

Tue
26
Jan
John Lister's picture

Ransomware Gets Doubly Dangerous

Ransomware infections used to be about forcing victims to pay to regain access to their files. Now it appears more and more scammers are treating it as an exercise in blackmail. A new cybersecurity report says 18 known ransomware gangs have switched ... their focus to threatening to publish stolen data unless the victim pays up. That's led to some businesses paying the ransom even though they had access to backups in order to restore their files. Traditionally ransomware has been about file encryptions. Scammers get access to a victim's computer or network through malware, then the infection " ... (view more)

Wed
01
Jul
John Lister's picture

25 Android Apps Steal Facebook Passwords

Google has removed 25 malicious Android apps which tried to steal user Facebook logins. As always, it's worth checking devices to see if these apps are installed, because they won't automatically uninstall from phones even being ousted from the Play ... Store. This particular batch of apps didn't have a common subject, but each promised to carry out a basic function, including: a flashlight, file cleaner, or card game. Hidden deep inside each app was malicious software that ran behind the scenes. The malware came alive each time an app was opened on the phone, specifically checking to see if the ... (view more)

Mon
25
May
John Lister's picture

Chrome to Encrypt DNS Lookups: What it Means

Google is increasing privacy on Chrome with a change to the way it connects users to websites. But businesses will be able to disable the move so they can keep tabs on staff. The change is to the way Chrome connects with Domain Name Servers (DNS), ... which act a little like a telephone directory for the Internet. A DNS takes a website address that a user types into their browser and finds the matching IP address, which identifies the specific connection to the device such as a server (or service) that physically stores the website's files. In the past, the connection between Chrome and a DNS was ... (view more)

Tue
12
May
John Lister's picture

Thunderbolt Flaw Could Bypass Security, Encryption

A researcher has found a major bug with Thunderbolt port technology that could undermine major security measures on multiple computer systems. There's a big mitigating factor though: an attacker would need extended physical access to the computer in ... order to carry out the exploit. Thunderbolt is a technology that is similar in concept to USB, but adds fiber optic to the usual copper wires. Compared to USB, Thunderbolt has high speed and capacity. Common uses include super-fast device charging (including laptops), 4K video, and extremely quick data transfers. Originally Thunderbolt was only ... (view more)

Pages

Subscribe to RSS - access