Security

Wed
18
Jul
John Lister's picture

Chrome to become Slower, Use More Memory to Tackle Malware

Google is updating the Chrome browser to give it better defenses against major security threats. It comes at the price of reduced performance and a larger memory footprint. The changes are to address two security bugs labeled Meltdown and Spectre by ... researchers. They take advantage of a flaw in almost every computer processor built since 1995, which is (as of this day) 100% of all computers, tablets, smartphones, laptops - and anything else that uses a processor. The flaw is in regard to a processor feature, which is designed to speed up a computer's response time. It works by using spare ... (view more)

Wed
11
Jul
John Lister's picture

Smart Home Tech Dangerous if Relationships Sour

Researchers have warned that smart home technology could be used to aid domestic abuse. They've put together resources for people who could be threatened by abusive partners or former partners. The list comes from University College London and ... follows a New York Times article detailing some of the way domestic abusers have turned smart home tech into a tool to further their abuse. One example is a former partner taking account of a security loophole to continue to access a smart doorbell. That meant they could not only watch video of the partner leaving or returning from the house and monitor ... (view more)

Thu
05
Jul
John Lister's picture

App Developers Could Be Reading Your Gmail

Google has confirmed that third parties may be able to read your Google email (Gmail) messages. The resulting controversy comes from a lack of clarity over its permission settings. The issue isn't about Google itself reading email messages. ... Previously, Google servers would scan email messages for keywords, then use targeted advertisements based on those keyboards whenever users logged into Gmail to read their emails. However, Google has dropped this policy last year and instead bases its ads on other information, such as Google web searches and YouTube viewing. The latest controversy relates ... (view more)

Thu
28
Jun
John Lister's picture

Swann Home Security Cam Sends Pics, Video to Wrong Users

A home security camera user was shocked to receive video from another user when she used a mobile app. The manufacturers say it's a one-off incident caused by human error. According to the BBC, Louisa Lewis has used her security camera since ... December. The set-up means that when the camera's motion sensor is triggered, it makes a recording and sends an alert to her mobile phone, complete with a clip. (Source: bbc.co.uk ) However, last week she began receiving clips from another family's camera instead. After a string of alerts, she contacted the manufacturers. They later stopped the clips ... (view more)

Wed
27
Jun
John Lister's picture

Lookalike Domain Names Yet Another Browser Scam

A security firm says efforts to make the Internet truly global could make scams easier. It also says a program for registering domain names in numerous languages can be abused for scam purposes. The issue involves the Internationalized Domain Name ... (IDN) system. This builds on the original Domain Name System (DNS) that helps 'translate' a web site name (such as www.infopackets.com ) into an IP address. These numbers then identify the location of the server, which then allows communication between the server and client machines (such as a web browser) to take place. The basic Domain Name System ... (view more)

Tue
26
Jun
John Lister's picture

Android Apps Now have Secure ID; Avoid Malicious Installs

Google is to mark Android apps to show they originated in the Google Play store. It's described as a security measure that could be particularly helpful in places with unreliable data connections. The change is to APK files, which stands for ... "Android PacKage"; these are files used to install an Android application on an Android device. Whenever you download an app from the Google Play store, it's always an APK file which is installed. However, the format is also the same if the app were to be downloaded from a third party website. Google is adding security metadata to all APKs ... (view more)

Tue
05
Jun
John Lister's picture

Browsers to Support Fingerprint Logins to Websites

Google's Chrome browser may soon support biometric logins to websites such as fingerprints. It follows on from Firefox becoming the first major browser to support biometric logins just a few weeks ago. Both browsers are supporting "WebAuthn," a web ... standard for authenticating logins without passwords. While it's a big step, it's only half the journey as the standard also has to be supported by the websites in question. (Source: digitaltrends.com ) The standard has been jointly developed by two key groups. The World Wide Web Consortium is the main body that develops standards for ... (view more)

Wed
23
May
John Lister's picture

Microsoft: New Processor Bug Could Leak Data

Both Microsoft and Google are warning of another bug in computer processors. It's similar to previous bugs known as 'Spectre' and 'Meltdown'. For now the new issue has the less dramatic codenames 'Speculative Store Bypass Variant 4' and ... 'CVE-2018-3639'. As with Spectre and Meltdown , it involves a processor function known as speculative execution that's meant to improve computation processes. Unlike some bugs, it's classed as a low risk to users but is significant because of the sheer number of computers that could be affected. The processor is the part of the computer that physically carries ... (view more)

Wed
11
Apr
John Lister's picture

New Ransomware Demand: Play Video Game, Not Cash

A newly unleashed ransomware attack doesn't force victims to pay money to regain access to files. Instead, it demands they play a video game. It's not clear yet what the point of the attack is, though it's most likely the work of a prankster who ... wants to test their skills at creating and distributing ransomware without doing any permanent harm. Ransomware is a form of malware that encrypts files on a computer and normally only unlocks them if the victim pays a fee. In most cases every file on the computer is encrypted, meaning that victims are locked out of their systems and unable to access ... (view more)

Thu
05
Apr
John Lister's picture

Chrome Browser PC Scans Come As Surprise

Google Chrome users have been surprised to discover that the Chrome browser scans their computers in search of malware. It doesn't appear to be a reason to panic, but arguably Google could have been more up front about it. The scans were spotted by ... Kelly Shortidge who works at a cyber security company. She noticed that the chrome.exe executable file (which is visible in Windows Task Manager) was scanning files in her Windows documents folder. On further investigation, she discovered Chrome has been doing this since around October, 2017. The scans are being done through Chrome Cleanup, a tool ... (view more)

Pages

Subscribe to RSS - Security