John Lister

Tue
14
Jun
John Lister's picture

Microsoft Pays a Whopping $26B for LinkedIn Buyout

Microsoft has agreed to buy business networking site LinkedIn for $26 billion. Analysts are less than certain about what it plans to do with the site. For those not familiar, LinkedIn works a little like Facebook but is designed primarily for ... business rather than personal contacts. It has a reported 100 million active users that access the site at least once a month. That compares to reports of 1.65 billion active users for Facebook. One of the most popular uses is to find potential clients or employers through mutual contacts. It's also possible to "endorse" a contact for ... (view more)

Thu
09
Jun
John Lister's picture

Report: Millions of Online Databases Unsecured

Belgian computers are most exposed to hacking according to a new study, with the US in 14th place. It's all because of millions of computers having open, unsecured connections to the Internet. Research firm Rapid7 looked at the full range of data ... connection services on the Internet beyond just the more familiar HTTP that most users use while browsing the web. These include FTP (file transfer protocol) SSH (secure shell for remote connections), and SMTP (simple mail transfer protocol), used for many email services. To carry out the research, the company embarked on the massive task of ... (view more)

Wed
08
Jun
John Lister's picture

TeamViewer Remote Access Customers Hacked

Management at TeamViewer, a remote access computer tool, have confirmed that a "significant number" of users have fallen prey to hackers. However, the company insists that all evidence suggests that there is no flaw in the system, but is instead ... pointing fingers at its users. TeamViewer allows users to login to a remote computer (even their own) from anywhere with an Internet connection. Once connected, users can operate the computer just as if they had physical access to the machine. The security for the system works in two ways: first, users get a reference number that identifies ... (view more)

Tue
07
Jun
John Lister's picture

Facebook Chief Online Accounts Hacked

Two online accounts belonging to Facebook chief Mark Zuckerberg have been hacked. The incident, thought to have resulted from a LinkedIn data breach, is a high profile example of the dangers of poor password choices. The hackers, calling themselves ... OurMine Team, took control of Zuckerberg's Twitter account and posted a message informing him of the breach. They also claimed to have accessed his Pinterest account (which appears to be correct) and his Instagram account, which doesn't appear to be the case. Perhaps the one point of relief for Zuckerberg is that his Facebook account was not ... (view more)

Thu
02
Jun
John Lister's picture

Bloatware from 5 Major PC Firms 'A Security Risk'

A security firm says that laptops from five major PC manufacturers have inherent security flaws which make the systems open to attack the very first time they are used. The problem deals with the automatic update tools installed by the manufacturer. ... Duo Labs explored the pre-installed manufacturer software on laptops from Acer, Asus, Dell, HP and Lenovo. In total, they found 12 vulnerabilities which they described as being ridiculously simple to exploit. (Source: duo.com ) The software is what's officially known as Original Equipment Manufacturer (OEM) software, but commonly referred to ... (view more)

Wed
01
Jun
John Lister's picture

Facebook Instant Messages Get More Secure

Facebook is reportedly planning to offer encryption on its messaging tools, which means that neither Facebook, nor governments could read the contents. It's also working on an option to integrate standard text messaging into its Messenger app. The ... idea is to offer end-to-end encryption, meaning that if a message is intercepted at any point between leaving the sender's device and arriving at the recipient's device, it would be unreadable. As well as being a selling point to users who worry about snooping, the tool could also mean Facebook would have a simple answer if law ... (view more)

Tue
31
May
John Lister's picture

Four Major Site Login Databases Stolen

A series of massive but dated breaches of high-profile sites is yet another reminder of the dangers of poor password security. While the sites in question are taking preventative measures, experts warn that hackers could use the stolen details to ... access other sites. In the past few weeks, hackers have offered up massive hauls of stolen login details from four major sites. They include details of 360 million accounts from MySpace and 65 million accounts from Tumblr, both lists appearing to date from 2013. Questions Posed For Sites And Users This follows 164 million account details from ... (view more)

Thu
26
May
John Lister's picture

Windows 10 RAM Requirement Doubles

Windows 10 will officially require more memory to run on many computers this summer. It's only a minor change but is the first time the official specifications for Windows have significantly increased in the past seven years. The biggest of the ... changes is the minimum memory specification for 32-bit computers, which is doubling from 1GB to 2GB. The specification for 64-bit machines was already 2GB and will remain unchanged. The change doesn't mean machines with 1GB of RAM will stop working. Instead, it means computer manufacturers will now have to include at least 2GB of RAM to be ... (view more)

Wed
25
May
John Lister's picture

Google Works On New Alternative To Password

Google is working on an option to replace password logins on mobile devices with a "trust score" based on multiple factors. The idea is to combine all sorts of factors that aren't secure enough on their own. The idea is to balance the need for ... security with the hassle of remembering passwords by building on the concept of two-factor authentication. That's an existing philosophy that deals with the inherent weakness of using a single login factor such as a password. Two-factor authentication combines a password with another factor such as using a specific device or having ... (view more)

Tue
24
May
John Lister's picture

More Users Hit By Surprise Windows 10 Upgrade

Microsoft's attempts to get all users running Windows 10 has taken yet another step further. It's now rolling out a sneaky way of getting users to "consent" to the update. As we've previously covered, Windows 10 is now classed as a "Recommended ... update" which means it will download and attempt to install on all Windows computers where the user hasn't actively changed the update settings from their default. After that reclassification, some users started seeing a pop-up message saying that Windows 10 was ready to install and the scheduled upgrade time. The ... (view more)

Pages

Subscribe to RSS - John Lister