John Lister

Tue
19
Feb
John Lister's picture

Windows 7 Users: Get this Critical Update (due March)

Microsoft has warned an update coming next month is absolutely critical for users running Windows 7. Without it, computers won't be able to use any future Windows security and feature updates, leaving users extremely vulnerable to malware infections ... (or worse). It's all to do with a change in the way Microsoft delivers security updates in a secure manner. Whenever Microsoft releases an update, it comes with a digital signature to prove that it came from Microsoft's servers and that the code it contains has not been tampered with. You can think of these security measures much the same way when ... (view more)

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Wed
13
Feb
John Lister's picture

Russia May Cut Itself Off From Internet

Russia may briefly disconnect from the Internet as a cyber-defense exercise. It's being billed as an attempt to see if the country could keep the benefits of the Internet without having to interact with the rest of the world, though critics suggest ... it is nothing more than political censorship. Russian officials are said to fear that other countries may be taking measures to block its country from the Internet. On paper there does not appear to be any such proposals, though NATO (the North Atlantic Treaty Organization) has threatened some form of sanctions over alleged cyber attacks by Russia ... (view more)

Tue
12
Feb
John Lister's picture

New Google On-the-fly Encryption Ultra Fast, Secure

Google has developed a new type of encryption that could run on any Android device. It means added security even for the most basic phones, smart watches and smart TVs. The encryption in question isn't for transmitting data, but rather for data ... stored on a device. The data is controlled by unlock methods such as passwords, pin codes and fingerprints. The idea is that if somebody gets hold of a device and doesn't have the correct login credentials, they can't simply extract files from the device and access personal data. At the moment Android devices with encryption use Advanced Encryption ... (view more)

Thu
07
Feb
John Lister's picture

Security Researcher Refuses to Share Bug with Apple

A security researcher says he's found a major security flaw in the Mac's password storage tool. But he's refusing to publish the details as a protest against Apple's "bug bounty" program. Linuz Henze has produced a video showing what he calls an ... exploit of the Keychain feature in MacOS Mojave, the current edition of the operating system for Mac computers. Keychain is an application on Macs that lets users save passwords for online accounts and digital certificates so that they don't have to type them in again. Users can also open Keychain and access a full list of passwords. Normally every ... (view more)

Wed
06
Feb
John Lister's picture

Google to Tell Users if Passwords Hacked

Google has launched a new tool to make it easier to know if a password has been hacked. But the way it works has raised some questions. The tool is called "Password Checkup" and is an extension for the Chrome web browser. It's designed to deal with ... details that are known to be part of a security breach, rather than offering more general advice such as using long passwords. If a user installs Password Checkup, Google will run a check whenever they log in to any site (not just ones Google operates). If it matches any entries on a database of known breaches, Chrome will display a ... (view more)

Tue
05
Feb
John Lister's picture

Facebook Fake News Fact-checkers Call it Quits

Two organizations hired by Facebook to check facts in news articles have pulled out of the deals. The Associated Press (AP) and Snopes are both being somewhat vague about exactly why they are stopping the work. While financial considerations may be ... the cause, third-party reports suggest the organizations were upset with the way Facebook handled their fact-checking operations. The two groups were among the most high-profile of what Facebook says is 34 organizations checking facts across 16 languages. According to the BBC, the AP and Snopes withdrawal means only two organizations in the US are ... (view more)

Thu
31
Jan
John Lister's picture

Robocalls, Spam Likely to Surpass Legit Calls in 2019

The number of robocalls to Americans rose by nearly 50 percent last year, according to a newly-published estimate. It's consistent with other reports that suggest that 2019 will be the first year where half of all phone calls are marketing messages. ... The figure comes from Hiya, a "spam-monitoring service" and is based on data from 450,000 users of its phone app. There's reason for a note of caution on the raw numbers, as it's possible the type of people who would use such an app are getting more unwanted calls than the average citizen in the first place. That aside, Hiya says that if the ... (view more)

Wed
30
Jan
John Lister's picture

WiFi Could Provide Electricity, Charge Smartphone

A new gadget can turn WiFi signals into electricity. It could one day mean an end to charging phone batteries, though the power levels mean medical uses might be more realistic. The device is a new variant of a "rectenna," which is short for ... rectifying antenna. Traditionally it turns electromagnetic energy into direct current electricity. Although the rectenna was developed more than 50 years ago, it's not been widely used. At the moment the most common use is in contactless cards, where a wireless signal from a card reader can not only open communications, but provide just enough ... (view more)

Tue
29
Jan
John Lister's picture

Malware Makers Set Sights On Motion Sensor

An extremely creative form of malware on Android devices uses motion sensors to help stay undetected. It's designed to combat one of the key methods used by malware scanning tools. Trend Micro says it found the malware hidden in two Google Play ... Store apps named "BatterySaverMobi" and "Currency Converter," which claimed to provide functions as their names suggest. (Source: arstechnica.com ) Once installed, the apps downloaded malware in the background, then used a fake system update message to trick the user into giving permission to install it. The malware, named " ... (view more)

Pages

Subscribe to RSS - John Lister