Security

Mon
30
Nov
John Lister's picture

Retirees Biggest Losers to Phone and Cyber Scams

Millennials are much more likely to be scammed out of money online or over the phone than retirees according to FTC figures. However, an elderly victim is likely to lose a much bigger sum. The figures come from analysis of Federal Trade Commission ... (FTC) data by Atlas VPN. They found that in almost every age group, more people have been scammed so far this year than in the same period last year, but the average loss is lower. That could simply be scammers making smaller demands because they know many people have less disposable cash this year. (Source: atlasvpn.com ) Elderly Targeted By Phone ... (view more)

Thu
12
Nov
John Lister's picture

Beware of Bogus Microsoft Teams 'Update'

If you use Microsoft Teams, watch out for bogus advertisements offering an "update". It's a scam designed to install malware that tries to steal personal data. The group chat and video conferencing tool has understandably become more popular this ... year with the increase in remote desktop connections to workplaces. That's attracted the attention of scammers who have put together a creative strategy to steal data. It's important to note that the attack doesn't aim to exploit any vulnerability in Teams itself. Instead, it's simply aimed at people using it, particularly those who have only started ... (view more)

Wed
28
Oct
John Lister's picture

Zoom to Completely Encrypt Video Calls

Zoom is to completely encrypt video calls at all times for most users. It will mean neither Zoom itself nor law enforcement agents or security services can access the content of calls. At the moment, Zoom encrypts the data that flows between ... individual participants on a call. However, it's Zoom's own servers which generate the encryption key issued to each participant. That means it's technically possible for Zoom to decrypt calls. While Zoom insists it's never had any intention of doing so, it does leave it open to pressure or legal threats from law enforcement officials to get access to ... (view more)

Thu
22
Oct
John Lister's picture

Adblockers Hijacked To Snoop On Users

Two ad-blocking Chrome extensions have been removed from distribution after they were altered to collect user data. People who've already installed Nano Adblocker and Nano Defender should now remove the tools. Instructions for removal are near the ... end of the article. Both Nano Adblocker and Nano Defender started out as legitimate extensions which users could integrate into the Chrome browser to block ads. They had a combined total of 250,000 downloads, and ironically that success seems to be what ended up causing the problems. New Owners Manipulate Extension The original developer sold the ... (view more)

Wed
14
Oct
John Lister's picture

Microsoft, Military Tackle Bonet Preceding Elections

Microsoft says it has disrupted "one of the world's most persistent malware operations." The action against "Trickbot" reportedly involved working with the US military. Trickbot is a botnet , created by infecting computers with malware then ... hijacking and combining their resources for further malicious activity. The operators largely built it using bogus emails that tricked users into opening a file attachment or clicking a link that downloaded and installed malware. The uses of Trickbot have included stealing login details such as online banking credentials; accessing sensitive data; and ... (view more)

Wed
07
Oct
John Lister's picture

Google Launches App Security Team

Google is creating a dedicated security team to hunt for bugs in "sensitive" Android apps. It will concentrate on the nature of the app rather than how widely its used. The new team will working in a different way to Google's existing program that ... offer bounties to independent security researchers who spot bugs in apps from the Google Play Store. To get the most "bang for its buck," that program only covers apps which have more than 100 million downloads. While it's logical enough to prioritize those apps as the number of people affected by a security breach will be highest, it doesn't take ... (view more)

Thu
01
Oct
John Lister's picture

COVID-19 Changes Ransomware Tactics

COVID-19 hasn't had much direct effect on the world of malware, but it may be why ransomware scams are getting scarily efficient. So says Microsoft in its latest "Digital Defense Report." The report is based on Microsoft's experiences through its ... built-in and standalone security measures on consumer and business devices and networks. It covers the year from July 2019 though June 2020. (Source: microsoft.com ) Microsoft suggests COVID-19 itself hasn't made much difference to most forms of malware. That's something of a surprise given more people are working from home and thus sending ... (view more)

Mon
14
Sep
John Lister's picture

Chromebook Update System To Change

The way Chromebook's are updated is changing to boost security in older machines. The new changes mean that updates are separate from the Chrome operating system and the Chrome browser itself. The fact that the Chrome browsers is so closely ... entangled with Chrome OS is one of the key selling points of Chromebooks. Most applications and functions run in a similar way to how a user would experience them while running the Chrome browser on a Windows PC. In turn, the learning curve for Windows users switching to a Chromebook is very shallow an intuitive if they are already familiar with the Chrome ... (view more)

Fri
11
Sep
John Lister's picture

Android 11 to Get Significant Security Boosts

Android devices will are getting some key security changes. The tweaks to the permissions system are meant to reduce the need to weigh up security against convenience. The changes will come in Android 11, which begins rolling out to handsets this ... month. Because its an open source system, the new version of the operating system will take longer to get to some brands than others, and older phones and tablets won't ever get it. The main changes are to Android's permission system, which allows users to theoretically control parts of the device's software and hardware an app can access or control ... (view more)

Wed
09
Sep
John Lister's picture

Adobe Flash Faces Final Curtain by December 2020

Microsoft will block Adobe Flash in its web browsers from the end of the year. It's the last major browser developer to drop the technology. While Adobe Flash was once the primary tool used for multimedia content on websites, it earned a poor ... reputation for security. It wasn't just that it had numerous security holes, but that when those holes were exploited, hackers were often able to access a computer's memory and gain a worrying level of control just by using a web browser. Steve Jobs a Noted Flash Hater Apple was arguably the first company to crack down on Adobe Flash content with Steve ... (view more)

Pages

Subscribe to RSS - Security