Security

Thu
01
Dec
John Lister's picture

Android Malware Hits One Million Users

Bogus Android apps have helped hackers seize control of more than a million Google accounts in the past few months according to a security company. The apps have also been posting fake online reviews in the names of victims. The attack involves ... malware that's been dubbed "Gooligan." It's particularly concerning because of the sheer amount of personal data a hacker could theoretically access if they can use somebody's Google accounts, such as their email messages and any files stored on Google Docs and Drive. The malware affects devices running versions 4 and 5 of the ... (view more)

Tue
29
Nov
John Lister's picture

San Francisco Trains Hit By Hackers

Hackers had an unexpected deal for San Francisco passengers on Black Friday: free journeys thanks to a ransomware attack. Officials were forced to suspend charging on the Municipal Railway system after hackers took control of payment computers. ... While the problem has now been fixed, it's not known if officials paid up a reported $73,000 ransom to regain access. The hackers manipulated the computer systems so that screens did not allow customer interaction and instead displayed a message reading "You Hacked, ALL Data Encrypted. Contact For Key ( cryptom27@yandex.com )ID:681, Enter. ... (view more)

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Thu
17
Nov
John Lister's picture

Smart Devices a 'Major Threat' when it comes to Cyber Warfare

A Harvard lecturer has warned Congress that only government regulations can prevent serious consequences from security attacks on the "Internet of Things." Bruce Schneier says there's little market incentive for buyers or sellers to fix a problem, ... should a problem arise. The Internet of Things (IoT) refers to the growing number of devices that can now be connected to the Internet, making them "smart devices". Rather than just computers and phones, the Internet of Things covers everything from thermostats to cars, often with the Internet connection allowing users remote ... (view more)

Wed
16
Nov
John Lister's picture

Report: 700M Android Phones Contain Chinese Spyware

Some cheaply made Android phones are reportedly sending copies of text messages to a Chinese source every 72 hours. The official explanation is that international customers have unintentionally received handsets with a "feature" designed for Chinese ... users. A security firm named Kryptowire made the discovery. It found that hidden software preinstalled in phones was contacting a Chinese server every three days and passing on details including contacts lists and call logs. The software also sent back daily updates with the full content of text messages and location data. (Source: ... (view more)

Wed
02
Nov
John Lister's picture

Microsoft Slams Google for Unveiling 'Critical' Windows Bug

Microsoft has criticized Google for revealing details of what the search giant has dubbed a "critical" security flaw in Windows. The two companies dispute whether Google gave Microsoft enough time to fix the problem before going public. The ... controversy lies in the fact that Microsoft has yet to release a fix for the problem and has not even said if one exists. The bug applies to 32-bit editions of Windows and allows an unauthorized local privilege escalation. The effect is to undermine a security feature known as " sandboxing ," which is designed so that if a hacker ... (view more)

Tue
25
Oct
John Lister's picture

Microsoft Warns: Fake Blue Screen of Death with 1-800 Number is a Scam

Microsoft has warned that scammers are trying to trick users with a fake "Blue Screen of Death" error message. The idea is to fool users into calling a bogus 1-800 tech support hotline. The Blue Screen of Death is an unofficial name given to a ... particular type of error message which appears when a Windows computer suffers a serious malfunction. In most cases, once the screen appears the only option is to reboot the computer, usually by switching it off with a physical power button or by resetting the machine with a reset button (if it is available). The idea of the screen is to give ... (view more)

Wed
19
Oct
John Lister's picture

Cops Could Force Non-Suspects to Unlock Phones

The Department of Justice has argued that police have the right to force anyone in a searched property to unlock phones with a fingerprint lock. Lawyers disputing the argument say that would go beyond the reasonable scope of a search warrant. It's ... the latest development in the ongoing development of privacy and search laws as technology evolves . For example, previous cases have concluded that police can't force somebody to provide a passcode or password to unlock a phone, because it would breach the Fifth Amendment's measures on self-incrimination. However, law enforcement ... (view more)

Wed
05
Oct
John Lister's picture

Should You Use a Password Manager?

Lately we've been posting a lot of articles about websites and services that have been hacked . One of the primary recommendations we have also repeated is that users should use unique and hard-to-guess passwords for each site, as this will help to ... prevent any further breaches. The reasoning is that if user account data is stolen on one site ( Yahoo is a good example ), the same username and passwords may also be valid on other sites - but only if users are using the same account names, passwords or password hints. Unfortunately this is often the case, because using the same passwords on ... (view more)

Tue
04
Oct
John Lister's picture

8 Tools that can Help Keep Your PC Secure

At Infopackets we're often asked to recommend security software and tools or give our opinion on specific products. While every product has its pros and cons, as the old saying goes, the proof of the pudding is in the eating. With that in mind, I ... thought I'd run down the actual tools I use in my day to day life rather than when we're testing out products. That means trying to find the balance of staying protected without taking up too much time and attention or computing resources. Permanent My main anti-virus software is Microsoft Security Essentials on Windows 7. It's ... (view more)

Pages

Subscribe to RSS - Security