John Lister

Tue
30
May
John Lister's picture

Android Phones Hijacked for Ad Scam

Tens of millions of Android devices may have been infected by rogue apps that found a way past Google's security checks. The 'Judy' malware came through apps in the official Google Play store. Google makes a big deal about its Play Store being a ... safe place to get apps. If an app is obtained from another source other that the Play Store, users must specifically confirm any associated risk during app installation. That makes it particularly embarrassing for Google, considering that the Judy malware was able to slip through its security checks. The malware in question has been dubbed ... (view more)

Thu
25
May
John Lister's picture

Eye and Voice Logins Compromised

Two biometric security measures have come into question after reporters and researchers claimed to have overcome them. A phone's iris recognition and a bank's voice log-in both appear to be less than perfectly secure. The Samsung Galaxy S8 - ... arguably the most high-profile and hyped phone currently running the Android system - includes an option to unlock the phone by simply looking at the camera. In a similar way to fingerprint recognition, it works on the idea that the patterns in the eye's iris are unique. Samsung described these patterns as "virtually impossible to ... (view more)

Wed
24
May
John Lister's picture

WannaCry Ransom Worm Creators Blamed for Two Previous Attacks

Security researchers say its highly likely hackers linked to North Korea were responsible for the recent widespread WannaCry ransomware attack . The same group, dubbed Lazarus, was previously blamed for two other high profile online attacks. ... According to security firm Symantec, the WannaCry attacks bore five distinct hallmarks of previous attacks thought to be the work of the Lazarus group. This includes shared code such as that used to spread the malware from machine to machine. Other common factors include the same IP address being used to issue commands to infected machines, and similar ... (view more)

Tue
23
May
John Lister's picture

Leaked Facebook Content Rules Full of Surprises

A newspaper has published details of Facebook's secret rules about what is and isn't allowed on the site. It shows the extreme difficulty of balancing free speech with privacy and responsibility issues, as well as the sheer scale of moderating ... posts. While Facebook publishes general guidelines about content it considers inappropriate, it doesn't reveal the precise criteria its staff use when removing content. The Guardian newspaper says it has seen more than 100 documents that are used by Facebook moderators when training and when doing their work. (Source: theguardian.com ) Violent language ... (view more)

Thu
18
May
John Lister's picture

Man Sues Woman for Texting During Movie

A Texas man is suing a woman he dated for text messaging while the pair were watching Guardians of the Galaxy Vol 2. Brandon Vezmar filed in small claims court seeking $17.31, the cost of his ticket for a 3D showing. According to the filing, ... reported in the Austin American-Statesman, the pair were on a first date after meeting online. Vezmar claims the woman "activated her phone at least 10-20 times in 15 minutes to read and send text messages." (Source: newsweek.com ) Texter Labeled Threat to Society He argues that this violated the theater's policy and spoiled the experience ... (view more)

Wed
17
May
John Lister's picture

Researchers to Fit Computer Chips in Human Brains

A computer processor manufacturer is working on chips to implant into human brains. It could dramatically improve life for people with spinal or brain injuries, but is years from becoming a reality. The project is a partnership between the ... University of Washington's Center for Sensorimotor Neural Engineering and ARM, a company which dominates the market for processors in mobile devices. It will build on existing technologies which can read signals in the brain and then wirelessly transmit them to nerve stimulators, allowing people to control their hands and arms despite suffering from ... (view more)

Tue
16
May
John Lister's picture

WannaCry Ransomware Worm: What You Need to Know

Beginning Friday, May 12, 2017, reports surfaced of a new Internet worm capable of infecting Windows machines instantaneously. The worm has been dubbed "WCRY" or "WannaCry" because of its malicious intent to install ransomware on the target machine. ... The Internet worm was made possible because of a leaked NSA (national security agency) document which essentially explained how to carry out the exploit. In this case, the malicious software locks computers such that their files are encrypted and cannot be accessed unless the victim pays a ransom (and the culprits then stand by ... (view more)

Thu
11
May
John Lister's picture

Facebook to Penalize Low Quality Sites

Facebook says it will no longer accept advertisements that link to "low-quality" web pages. It's also going to reduce the likelihood that people see user-posted links to such pages. The system Facebook uses for identifying such pages will be ... automated but is based on guidelines developed from manually reviewing "hundreds of thousands" of pages that Facebook had linked to. After staff decided which of these sites were low quality, its computers looked through those pages to spot patterns of common characteristics. (Source: fb.com ) Toenail Fungus Unwelcome Facebook isn ... (view more)

Wed
10
May
John Lister's picture

Microsoft Patches Major Security Bug

Microsoft has suffered a hugely embarrassing security flaw that takes advantage of a bug in Windows' built-in security software. But, security experts have praised its extremely rapid response. The bug, spotted by Google's Tavis Ormandy, was in ... Microsoft's own malware protection tools (including Windows Defender), which is built directly into Windows. Such tools have been so successful that for many users, third-party security tools are no longer necessary. The problem was specifically with a tool known as MsMpEng, (short for Microsoft Malware Protection Engine) that is enabled by ... (view more)

Tue
09
May
John Lister's picture

Phishing Scammers Try New Twist

An estimated one million people around the world received a recent phishing email, though it only posed a risk for around an hour before Google stepped in to stop the scam in its tracks. Victims of the scam may have inadvertently given attackers ... control of their email accounts. The attack involved a bogus email claiming that a contact tried to share a document with the recipient using Google Docs. While only a small proportion of people use Google Docs, the attackers appear to have been playing the numbers game. Attackers Accessed Emails and Contacts Unlike most phishing scams, the attackers ... (view more)

Pages

Subscribe to RSS - John Lister