John Lister

Wed
31
Jul
John Lister's picture

iPhone/iPad Users: Update Immediately

Google says it has found half a dozen major security flaws in Apple's iPhone messaging system. A new iOS update fixes five of the problems, but Google says one remains unpatched. The flaws were discovered by Google's Project Zero, a department that ... takes its name from the idea of "zero day" bugs . That's where would-be hackers become aware of a security issue before the relevant software developers are able to patch the bug. The zero day bugs are then exploited which often results in elevated privileged access levels given to a rogue program. The problems are with iMessage, the instant ... (view more)

Tue
30
Jul
John Lister's picture

Mega Hack Exposes Entire Population's Data

Financial records of almost every adult in Bulgaria have been stolen in a cyber attack. It's led to the unlikely situation of the country's leader reportedly exaggerating the attacker's skills. One man has been arrested following the attack, which ... looks to have involved unauthorized access to a database with records for every working adult in the country. That's almost five million people. There's some debate over exactly what was involved in the breach. Press reports suggest it not only included personal information such as date of birth and address, but also tax ... (view more)

Thu
25
Jul
John Lister's picture

Robocall Bill Passes House

The House of Representatives has overwhelmingly backed a bill to crack down on unwanted robocalls. The bipartisan measure would increase regulatory power and make use of technology to tackle the problem. The proposed Stopping Bad Robocalls Act ... passed by 429 votes to 3. It follows a 97 to 1 vote in the Senate on a similar bill in May. It's now highly likely one of the bills will pass through both houses and become law. (Source: appleinsider.com ) Robocalls are automatically dialed phone calls. Because there's no need for a human to dial the number, both legitimate marketers and scammers can ... (view more)

Wed
24
Jul
John Lister's picture

Google Cracks Down on Rogue Browser Extensions

Google is cracking down on Chrome browser extensions that risk user privacy. The new policies err on the side of caution and follow a Washington Post investigation that claimed millions of users had data stolen by rogue browser extensions. A browser ... extension, also called an "add-on" in some browsers, is a third-party tool that users can incorporate into their web browser. It's designed to add extended functions to the browser, which then make using the browser and web much easier. Examples of extensions include: a password manager, which can remember user passwords and ... (view more)

Tue
23
Jul
John Lister's picture

Google's Updated Incognito Mode May Break Paywalls

Google is changing the way its "incognito" mode works. It says the move is necessary, but some news and magazine website owners are upset by the change. Incognito is Google's version of private browsing. Despite the name, it's mainly about privacy ... on the user's device: when in incognito mode, the local browser stops adding websites to its browsing history, which consists of a list of pages the user has visited and the searches they've carried out. The mode won't stop the activity being recorded by an Internet service provider (ISP) or by a local network administrator - something that has ... (view more)

Wed
17
Jul
John Lister's picture

New Router Exploit Auto-redirects to Rogue Sites

A security firm says hackers have hijacked 180,000 routers in Brazil alone so far this year. They target people who haven't changed the default login for the router's control system. According to Avast, there have been more than 4.6 million attempts ... to modify router settings remotely. Although the attacks were targeted at people using particular Internet service providers in Brazil, there's no reason the same tactics couldn't work elsewhere. The goal of the attacks is to change the DNS settings on a router. In simple terms, that's like the address book that a router uses to turn a website ... (view more)

Tue
16
Jul
John Lister's picture

Shady Lawyers Uploaded Movies, Sued Downloaders

Two lawyers have been jailed for five and fourteen years respectively for an online copyright scam. The pair uploaded adult material with the specific aim of suing those who downloaded it. John Steele and Eric Hansmeir have been convicted on fraud ... and money laundering charges for their activities as "Prenda Law." The pair bought the rights to adult films and even produced their own material. They then uploaded it to file sharing sites and waited until people downloaded it. $3,000 Settlements Accepted Prenda Law then got court orders for Internet service providers to identify the ... (view more)

Mon
15
Jul
John Lister's picture

Google Admits Staff Listen to Google Home Recordings

Google has admitted that staff listen to some recordings from the Google Home smart speaker. It says it's only for quality control purposes. It made the comments after a contractor in the Netherlands went to local media to talk about his work, in ... which he was paid a "few cents" to transcribe comments and questions made by people using the voice controlled device or phone app. According to the worker, some of the clips he heard did not appear to be people intentionally using the device. This included one case of a mother scolding a child and another clip which the worker suspected ... (view more)

Thu
11
Jul
John Lister's picture

New Super Stealth Astaroth Malware Records Keystrokes

Microsoft has warned users about a complicated but cunning malware attack that might not be caught by all security tools. The "Astaroth" malware doesn't actually exist as a file in its own right. The main risk to users from Astaroth is that it ... includes a keylogger. This means it can access everything victims type, including passwords and other sensitive data. That's one of the reasons sites such as online banks often ask users to type specific characters (such as third and eighth) rather than an entire password. Malware Hides Within Windows What makes Astaroth so hard to detect is ... (view more)

Wed
10
Jul
John Lister's picture

Chinese Giant Ditches Android OS

Chinese phone maker Huawei says its making a rival to Android that will be "up to 60 percent faster." The problem is it will be missing many key Google applications. Huawei started work on the new mobile operating system after an executive order ... from the US President that limits American companies supplying the Chinese company, something said to relate to security concerns. Following the order, Google announced it would no longer supply Huawei with new editions of Android or security updates for the existing system. While it could still use Android, which is an open source system, ... (view more)

Pages

Subscribe to RSS - John Lister