security

Tue
24
Mar
John Lister's picture

Windows 10 Upgrade For Pirates: Applies Worldwide

Last week Microsoft confirmed it will give users running pirated copies of Windows 7 and 8.1 a free upgrade to Windows 10 . Now it's revealed that offer has a big restriction, one that may undermine the entire purpose of the move. Windows 10 Upgrade ... For All Applies Worldwide The initial announcement appeared as if the piracy offer would only apply to users in China. Since then, however, Microsoft has made some clarified two main points. One is that the offer will apply worldwide, and not just in China. The move was controversial enough in piracy-ridden China, and even more so in countries ... (view more)

Thu
19
Mar
John Lister's picture

Microsoft: Pirates Can Get Windows 10 For Free

Microsoft is offering Chinese users of pirated Windows software a free upgrade to Windows 10. It appears to be a case of profit over principle that may also have security benefits. Virtually all users of Windows 7 and 8.1 around the world will ... already qualify for a free upgrade to Windows 10 when it's released, something Microsoft now says will be "this summer." However, in most places that only applies to legitimate users. Things are very different in China, however, which has a combination of an increasingly wealthy tech-loving population and loose government policing of ... (view more)

Wed
18
Mar
John Lister's picture

New Yahoo Login System Uses No Password

Yahoo has introduced an option to log in without needing to remember a password. It requires a cellphone and may trade security for convenience. Under the new system, which is optional, users can choose not to use a standard passwords for future ... log-ins. Once activated, the system will mean a button appears on Yahoo's site when the user is ready to log in to the account. When the user clicks this button, Yahoo sends a one-time only, four character password to the user's cellphone. Once the user logs in, the password field becomes inactive. The process is then repeated the next time ... (view more)

Wed
11
Mar
John Lister's picture

Lawsuit: Gov't Net Surveillance Breaches Constitution

The US government is being sued by civil liberties groups who say the security services' collection of personal data online fundamentally breaches the constitution. At issue is the question of whether or not the government's interpretation of the ... law correctly allows for mass surveillance without probable cause about specific individuals. The lawsuit is led by the American Civil Liberties Union and is joined by at least nine other groups, including the organization that oversees Wikipedia. It makes the accusations against the National Security Agency (NSA) and the Department of ... (view more)

Tue
24
Feb
John Lister's picture

Lenovo, Superfish Spyware Prompts Class Action Suit

PC manufacturer Lenovo may have to defend a class action lawsuit after it reportedly sold notebook computers that contained unwanted adware. The lawsuit follows the revelation that the adware had the potential to spy on users. The case involves a ... piece of software called Superfish. It was designed to look at images users were viewing online, identify items, find websites selling the item at a cheap price, and display an offer in a pop-up window. The software came pre-installed on some Lenovo notebook PCs and integrated with multiple browsers. Superfish came under several different categories ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Tue
17
Feb
John Lister's picture

Report: NSA Hacked Hard Drive Firmware for Spying

The US government has been accused of embedding spyware directly onto hard drives using secret manufacturer information. Russian security software manufacturer Kaspersky Lab made the claims, and stem from its efforts to find and eliminate malicious ... software. Kaspersky says officials appear to have only used the spyware to target specific, foreign-based individuals. Kaspersky says that the spyware is part of an operation controlled by the National Security Agency (NSA) , under the name Equation Group. It claims the NSA figured out how to put spying software in the firmware of hard drives made ... (view more)

Wed
11
Feb
John Lister's picture

Chinese Hackers Infect Forbes, Spy on Visitors

Chinese spies have reportedly infected the Forbes website in order to steal data from staff at defense and finance organizations. The attack is unlike most attacks on large websites, as the motive was for intelligence, rather than profit. The Forbes ... website attack reportedly took place in November 2014, with the security gap plugged by approximately three days later. To propagate the attack, hackers replaced a legitimate file on the web server used for the "Thought of the Day" feature, which appeared on every page of the Forbes website. The malicious file was then automatically ... (view more)

Thu
25
Dec
Brandon Dimmel's picture

Report: Most WiFi Routers Very Poorly Protected

A survey of 2,000 households in the United Kingdom has revealed that few people take their WiFi network's security seriously enough. In fact, the security software firm behind the study, Avast, says our approach to home WiFi security is comparable ... to attitudes towards PC security in the 1990s -- which is not very good at all. Weak WiFi Passwords a Serious Problem Avast's survey revealed a number of alarming issues. First, the company found that more than 50 per cent of all home routers have little or no protection, making them easy to hack. In far too many cases, Avast found people ... (view more)

Tue
09
Dec
Brandon Dimmel's picture

Shop Online? Watch out for Fake Email Order Scam

A new report suggests that hackers are using fake email orders with malicious links to fool victims into installing malware onto their machines. Security experts are therefore warning all Internet shoppers to take extra care when opening their ... emails this holiday season. According to Brian Krebs, a former Washington Post writer who covers cyber crime, the problem is becoming more and more prevalent. "If you receive an email this holiday season asking you to 'confirm' an online e-commerce order or package shipment, please resist the urge to click the included link or attachment, ... (view more)

Pages

Subscribe to RSS - security