John Lister

Thu
01
Dec
John Lister's picture

Android Malware Hits One Million Users

Bogus Android apps have helped hackers seize control of more than a million Google accounts in the past few months according to a security company. The apps have also been posting fake online reviews in the names of victims. The attack involves ... malware that's been dubbed "Gooligan." It's particularly concerning because of the sheer amount of personal data a hacker could theoretically access if they can use somebody's Google accounts, such as their email messages and any files stored on Google Docs and Drive. The malware affects devices running versions 4 and 5 of the ... (view more)

Wed
30
Nov
John Lister's picture

Apple Users Flooded with 'Calendar Spam'

Apple experts warn that spammers are abusing the iPhone's calendar system. They say users should be wary of responding in any way to unexpected "event" invites. The problem appears to affect multiple Apple products, including Mac computers, iPhones ... and iPads. It takes advantage of the way Apple's system lets users create events and then invite friends and family by inputting their email address. The spammers, who appear to be based in China, are using large lists of email addresses to send invitations to non-existent events, usually listed as special offers on consumer goods ... (view more)

Tue
29
Nov
John Lister's picture

San Francisco Trains Hit By Hackers

Hackers had an unexpected deal for San Francisco passengers on Black Friday: free journeys thanks to a ransomware attack. Officials were forced to suspend charging on the Municipal Railway system after hackers took control of payment computers. ... While the problem has now been fixed, it's not known if officials paid up a reported $73,000 ransom to regain access. The hackers manipulated the computer systems so that screens did not allow customer interaction and instead displayed a message reading "You Hacked, ALL Data Encrypted. Contact For Key ( cryptom27@yandex.com )ID:681, Enter. ... (view more)

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Wed
23
Nov
John Lister's picture

Facebook Messages May Harbour Scams, Ransomware

Facebook users have been warned to watch out for bogus links in messages that appear to be from friends. While Facebook appears to be on top of the problem for now, it's an approach that could lead to personal data being siphoned off, or computers ... locked. The problem was highlighted by security researcher Bart Parys who became aware of the problem this weekend after a tip-off from a friend. It involves Facebook messages which appear to consist only of an image but are actually a type of file called SVG (scalable vector graphics). 'YouTube' Video Next Step In Scam Normally such ... (view more)

Tue
22
Nov
John Lister's picture

Smartphones Could Replace Cards at ATMs

A British bank is testing ATMs that let customers take out money using their phone rather than a bank card. It says the technology could be safer than using a card because there's less room for hackers to steal details. Withdrawing money without a ... card isn't a completely new idea. One rival bank already allows users to get cash out using a smartphone app that generates a unique code that they can then type in to the phone to get money. The idea is to remove the need to carry a card, for example on a night out. The new system from Barclays would be even quicker to use however, and ... (view more)

Thu
17
Nov
John Lister's picture

Smart Devices a 'Major Threat' when it comes to Cyber Warfare

A Harvard lecturer has warned Congress that only government regulations can prevent serious consequences from security attacks on the "Internet of Things." Bruce Schneier says there's little market incentive for buyers or sellers to fix a problem, ... should a problem arise. The Internet of Things (IoT) refers to the growing number of devices that can now be connected to the Internet, making them "smart devices". Rather than just computers and phones, the Internet of Things covers everything from thermostats to cars, often with the Internet connection allowing users remote ... (view more)

Wed
16
Nov
John Lister's picture

Report: 700M Android Phones Contain Chinese Spyware

Some cheaply made Android phones are reportedly sending copies of text messages to a Chinese source every 72 hours. The official explanation is that international customers have unintentionally received handsets with a "feature" designed for Chinese ... users. A security firm named Kryptowire made the discovery. It found that hidden software preinstalled in phones was contacting a Chinese server every three days and passing on details including contacts lists and call logs. The software also sent back daily updates with the full content of text messages and location data. (Source: ... (view more)

Tue
15
Nov
John Lister's picture

Google Slammed Over Election News Link

Critics of Google say the search engine's algorithm is giving undue credibility to a website claiming to have final voting figures for the US election. The site, which is given prime position when users search for several election-related terms, ... appears to be unauthoritative and rely on questionable sources. As with any story in this year's US presidential election, its likely to prove partisan responses on both sides. However, this specific scenario is about Google's quality control, rather than political arguments. The issue surrounds the way Google doesn't just produce a ... (view more)

Thu
10
Nov
John Lister's picture

Sites Hosting Malware Get 30 Day Google Ban

Google is to take harsher actions against sites that it determines house malware or attempt to steal user data. Repeat offenders will effectively be hidden from view from many users for 30 days. The changes are to Google's Safe Browsing feature, ... which vets sites for malicious content. The feature is built into the Chrome browser and made available for other online tools. It's also built-in to all the links from Google search results, regardless of the user's browser. When Google detects a site is potentially harmful, it won't take users directly to the page when they click on ... (view more)

Pages

Subscribe to RSS - John Lister