access

Wed
12
Apr
John Lister's picture

Researchers: Phone Tilt Could Reveal PIN

Motion sensors in smartphones could give away your lock code to hackers according to new research. But practical limitations mean related attacks might have to be specifically targeted. Researchers at Newcastle University explored the idea that ... tools such as accelerometers, gyroscopes, compasses and GPS chips in phones could reveal more detail than users realize. The tools are used for a variety of functions such as location tracking, fitness tracking and gesture control such as a user turning a phone face down to instantly switch it to "do not disturb" mode. Their theory was that ... (view more)

Wed
29
Mar
John Lister's picture

Docs.com Users Warned to Check Sharing Settings

Users of Microsoft's Docs.com have been warned to review security settings on their account. Researchers found it was all too easy to search and find personal data contained in documents mistakenly made public. Docs.com is designed to make it easy ... to share documents with other users over the Internet, including PDF files and those in Office formats, regardless of the device and operating system they are using. The site includes a search feature that lets a user look for text in any document on the service to which they have access - something that's designed to make it much easier ... (view more)

Thu
09
Mar
John Lister's picture

Report: CIA Hacking Smart TVs, Listening In

Leaked documents suggest the CIA has a program for spying on people through home devices such as Smart TVs. However, it appears such attacks are highly targeted and often require physical access to the TVs. The claims come through a batch of 8,761 ... documents released by WikiLeaks, which says they come from the CIA. That agency has yet to comment on their authenticity and have not yet been independently verified. The documents are said to detail some of the tactics the CIA have used to improve digital surveillance. The overall message is that the agency appears to be concentrating more on ... (view more)

Thu
13
Oct
John Lister's picture

Social Media Monitoring Service Sold Data to Cops

A company accused of selling social media data to the police has been blocked from accessing some or all content from three major sites. Facebook, Instagram and Twitter made the move after complaints from the American Civil Liberties Union (ACLU.) ... According to the ACLU, Geofeedia markets its social media monitoring product to police forces as a way to monitor people who may be involved in protests. In one marketing message, a company representative specifically cited the use of the service during the high-profile unrest that followed the shooting of a man by police officers in Ferguson, ... (view more)

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Fri
01
Jul
Dennis Faas's picture

How to: Prevent Others from Reading Your Emails or Accessing Your PC (at Work)

" Dear Dennis, I work in an office on a desktop PC. If I am away from the PC, anyone in the office can hop onto my computer and access my emails because the 'offline access' to my emails feature is enabled. I have no idea how to turn it off! How can ... I prevent others from accessing my emails while I'm away? " My response: The quick and short answer is that disabling offline access to emails depends on the application or service you're using - most likely somewhere in your user account settings if you're using something like Gmail, or possibly in the "Tools -> Options" menu if you're using ... (view more)

Wed
08
Jun
John Lister's picture

TeamViewer Remote Access Customers Hacked

Management at TeamViewer, a remote access computer tool, have confirmed that a "significant number" of users have fallen prey to hackers. However, the company insists that all evidence suggests that there is no flaw in the system, but is instead ... pointing fingers at its users. TeamViewer allows users to login to a remote computer (even their own) from anywhere with an Internet connection. Once connected, users can operate the computer just as if they had physical access to the machine. The security for the system works in two ways: first, users get a reference number that identifies ... (view more)

Thu
25
Feb
John Lister's picture

FTC Cracks Down on Poor Router Security

ASUS has agreed to government supervision for 20 years after exaggerating the security of its routers. Officials say the company put hundreds of thousands of computers at risk. The company has agreed to a settlement in response to Federal Trade ... Commission (FTC) charges. The alleged breach of rules wasn't in the security flaws themselves, but rather that ASUS continuing to market the routers as "safe" was misleading to customers. Among ASUS's bold claims was that its routers could "protect computers from any unauthorized access, hacking, and virus attacks." This ... (view more)

Tue
09
Feb
John Lister's picture

Facebook's Free Internet Service Banned in India

The Indian government has banned Facebook from offering free Internet access in the country. Officials said the program breached net neutrality principles by favoring some sites over others. Since 2013, Facebook has offered a service called Free ... Basics in some nations where Internet access is unaffordable to large parts of the population. Most of these countries are in Africa and the Indian subcontinent. The service, offered in partnership with cellphone operators, gives users free access to data usage on a smart phone, which for many users will be their primary or only way of getting online ... (view more)

Thu
02
Apr
John Lister's picture

Survey: Are Smartphones a Vital Tool in 2015?

A newly-published study shows that the average person could manage without a smartphone for many common tasks. However, for a select group, smartphones are the only realistic option for accessing online services. The report comes from the Pew ... Research Center, which brought together several surveys, each of around 2,000 smartphone users. The results provide very differing meanings, depending on how they are viewed. (Source: pewinternet.org ) Most Tasks Achievable Without Phones On one hand, the study suggests smartphones are by no means vital for many everyday tasks. Participants were asked if ... (view more)

Pages

Subscribe to RSS - access