security

Wed
29
Aug
John Lister's picture

Google Warns: Major Security Flaw in Fortnite Game

The makers of the hit video game "Fortnite" have called Google irresponsible for revealing a security flaw. The controversy follows Epic Games choosing not to use the Google Play store to distribute the game. Although it's free to download and play, ... Fortnite has proved hugely lucrative thanks to in-game purchases. Although 'buying' character costumes and animations doesn't affect gameplay, gamers - many of them children - have now spent more than a billion dollars. With so much money at stake, it appears Epic Games didn't want to go through Google Play for the Android version. Had ... (view more)

Wed
22
Aug
John Lister's picture

Microsoft Phasing Out Windows 8

Microsoft has announced several measures to slowly kill off Windows 8. It's targeting apps to try to persuade holdouts to upgrade to Windows 10. From October 31st, 2018, new apps designed for either Windows 8 or 8.1 on desktop or Windows Phone 8 on ... mobile devices can no longer be added to the Microsoft Store. From July 1st, 2019, Microsoft will stop sending app updates to Windows Phone 8 devices. The theory seems to be that developers will no longer have any reason to work on the platform and in turn it will become less and less attractive to users. Updates for existing Windows 8 and 8.1 ... (view more)

Wed
25
Jul
John Lister's picture

Microsoft: Phishing Scam Targets Politicians

Microsoft says hackers have targeted at least three candidates for Congress. Security experts say the group behind the attacks has been linked to Russia's intelligence services. The revelation came at the Aspen Security Forum in a speech from Tom ... Burt, Microsoft's head of Customer Security ... (view more)

Wed
18
Jul
John Lister's picture

Chrome to become Slower, Use More Memory to Tackle Malware

Google is updating the Chrome browser to give it better defenses against major security threats. It comes at the price of reduced performance and a larger memory footprint. The changes are to address two security bugs labeled Meltdown and Spectre by ... researchers. They take advantage of a flaw in almost every computer processor built since 1995, which is (as of this day) 100% of all computers, tablets, smartphones, laptops - and anything else that uses a processor. The flaw is in regard to a processor feature, which is designed to speed up a computer's response time. It works by using spare ... (view more)

Wed
11
Jul
John Lister's picture

Smart Home Tech Dangerous if Relationships Sour

Researchers have warned that smart home technology could be used to aid domestic abuse. They've put together resources for people who could be threatened by abusive partners or former partners. The list comes from University College London and ... follows a New York Times article detailing some of the way domestic abusers have turned smart home tech into a tool to further their abuse. One example is a former partner taking account of a security loophole to continue to access a smart doorbell. That meant they could not only watch video of the partner leaving or returning from the house and monitor ... (view more)

Thu
28
Jun
John Lister's picture

Swann Home Security Cam Sends Pics, Video to Wrong Users

A home security camera user was shocked to receive video from another user when she used a mobile app. The manufacturers say it's a one-off incident caused by human error. According to the BBC, Louisa Lewis has used her security camera since ... December. The set-up means that when the camera's motion sensor is triggered, it makes a recording and sends an alert to her mobile phone, complete with a clip. (Source: bbc.co.uk ) However, last week she began receiving clips from another family's camera instead. After a string of alerts, she contacted the manufacturers. They later stopped the clips ... (view more)

Tue
26
Jun
John Lister's picture

Android Apps Now have Secure ID; Avoid Malicious Installs

Google is to mark Android apps to show they originated in the Google Play store. It's described as a security measure that could be particularly helpful in places with unreliable data connections. The change is to APK files, which stands for ... "Android PacKage"; these are files used to install an Android application on an Android device. Whenever you download an app from the Google Play store, it's always an APK file which is installed. However, the format is also the same if the app were to be downloaded from a third party website. Google is adding security metadata to all APKs ... (view more)

Thu
03
May
John Lister's picture

Facebook Fires 'Stalker' Engineer

Facebook has fired an engineer accused of misusing private data to 'stalk' women online. He is thought to be a security engineer who abused his 'privileged access' level to data. One of the engineer's alleged victims was the founder of a cyber ... security company. She's made public the conversation she had with the Facebook engineer, in which the man talks about being a security analyst. He wrote: "... I also try to figure out who hackers are in real life... [so, I'm a] professional stalker." It appears the pair were conversing after being connected through the dating app Tinder. To make ... (view more)

Fri
06
Apr
Dennis Faas's picture

How to Fix: Windows 10 1709 Won't Install

Infopackets Reader Jose B. writes: " Dear Dennis, For the past few months, my PC has tried to upgrade to Windows 10 version 1709, but each time it fails to install. Whenever I use my computer I receive a pop up message on my desktop stating that ' ... Your device needs the latest security updates . Microsoft can't install important security updates on your PC until you install the most current version of Windows 10.' When I look at my Windows Update history, it says the upgrade to version 1709 failed (repeatedly) . When I manually check for updates, it says: ' Your device is at risk because it's ... (view more)

Thu
22
Mar
John Lister's picture

US Blamed for Sophisticated Router Malware

Last week security researchers said a piece of malware named "Slingshot" was so sophisticated it was backed by a government. Now it appears that government was the United States and that the revelations may have compromised an anti-terror campaign. ... The original reports didn't name the country involved. That might not quell controversy, however the reports came from Kaspersky Labs, a security company based in Russia. Slingshot exploited a bug in a specific brand of routers. In simple terms, it was able to take advantage of the way the router updated its operating software on an ... (view more)

Pages

Subscribe to RSS - security