John Lister

Tue
11
Feb
John Lister's picture

Scientists use Light, Sound to Produce 100 Gbps Internet

Researchers believe a new type of cable could carry Internet data at speeds 100 times greater than even the fastest on offer today. The new technology could benefit hospitals and research facilities in particular. The technique was developed by ... researchers at universities in Leeds and Nottingham in the United Kingdom, and is based around similar technology found in fiber optic cables. Those are the fastest data-carrying cables and work by sending pulses of light down a tiny transparent tube. By far, the greatest benefit of utilizing fiber optic cables is that it can transfer data over long ... (view more)

Mon
10
Feb
John Lister's picture

Banking Malware Relays Passwords to Cyber Criminals

Researchers have warned of a sneaky trick that uses malware to collect passwords for online banking. The "Metamorfo" malware disables autocomplete to force users to retype passwords that can then be hijacked. Metamorfo is familiar to security ... researchers, but has developed two new characteristics. The first is that it no longer targets only financial institutions in Brazil, but has expanded to other countries. The seconds is a new tactic to make it more effective. The malware works in a familiar fashion. It's distributed through a .ZIP file that's disguised as an invoice attached to ... (view more)

Thu
06
Feb
John Lister's picture

Report: Malware Attacks Fall Year-on-Year

A computer security company claims malware attacks are on the decrease. The difference appears to be that criminals are more closely targeting attacks, which could be good news for the average user. The figures come from Sonicwall, which offers ... firewalls and other cyber security solutions. The data is based on the attacks and attempted attacks it detected among customers covering 1.1 million sites in 215 countries. (Source: sonicwall.com ) Although the actual numbers it gives aren't necessarily meaningful, the year-on-year comparisons between its new report covering 2019 and the one it did ... (view more)

Wed
05
Feb
John Lister's picture

Facebook Messenger Kids Beefs Up Parental Controls

Facebook has given parents more ability to monitor their child's use of its messaging tool. The move follows criticism of Facebook producing such a tool in the first place. "Messenger Kids" launched back in 2017 for use by under 13s, who aren't ... allowed to use Facebook itself. The key selling point was that parents had to approve the contacts that the child could then exchange messages with. That hasn't always worked exactly as planned, as a glitch meant children could take part in group chats containing people who weren't approved or even that they'd blocked. Parents will now be ... (view more)

Tue
04
Feb
John Lister's picture

Android Users: 17 Rogue Apps to Delete

A security company has spotted 17 rogue Android apps that users should immediately delete. All 17 apps were approved by the Google Play store, where they managed to get past Google's security checks. Bitdefender, which published the list of apps, ... says the apps aren't malware as such. However, they use tactics associated with malware creators and could seriously inconvenience users. Bitdefender dubs this as 'riskware'. The List Of Shame The apps to immediately delete are: 4K Wallpaper (Background 4K Full HD) Backgrounds 4K HD Barcode Scanner Car Racing 2019 Clock LED Explorer File ... (view more)

Wed
29
Jan
John Lister's picture

Malware Botnet Mysteriously Hijacked

A malicious network of 500,000 computers used to spread malware around the globe has been taken over by do-gooders in an apparent hijack meant to foil cyber criminals. Victims of the botnet have not only found the stealth malware removed from their ... system, but are also receiving an on screen warning to update their computers. It appears the malware creators are themselves the victim of a hack attack by an online vigilante. Phorpiex Botnet a Decade Old, 500k Strong The malware concerned is distributed through the Phorpiex botnet, which has been operating for nearly 10 years. A botnet is a ... (view more)

Tue
28
Jan
John Lister's picture

State Could Ban Gov't Ransomware Payments

New York state senators want a legal ban on local governments paying ransomware demands. The bipartisanship move is based on the idea that paying up simply incentivises the attacks. Ransomware is malicious software that encrypts files on a hard ... drive so that they become unusable. Cyber criminals then demand a hefty ransom to unlock the files. Two state senators, one Democrat and one Republican, have each proposed broadly similar bills. They are currently in the committee stage and its likely that one will go ahead to a full vote of the New York State Senate. Both bills are based on similar ... (view more)

Mon
27
Jan
John Lister's picture

Windows 7 'End Of Life' Lasts Just 13 Days

Microsoft has issued one extra fix for Windows 7 after it passed the deadline for security updates to the system. In an all-too-familiar move, the extra update fixed a problem caused by the final scheduled update. January 14, 2020 officially marked ... the end of Windows 7's Extended Support period . During the Extended Support period, Microsoft no longer added new features or offered free support, but did issue security patches, fixed major bugs and offered chargeable support for consumers. That's now over and the official position is that there will be no further updates of any kind for Windows ... (view more)

Thu
23
Jan
John Lister's picture

Experts: Windows Feature Can Be Used as Ransomware

Ransomware attackers could turn a key Windows security tool against the system, according to new research. The tactic could also evade leading security tools. The research from SafeBreach Labs covered "EFS", otherwise known as Encrypting File ... System. EFS was released as far back as Windows 2000 (in the year 2000), and is somewhat similar to Bitlocker. The main difference between the two is that Bitlocker can encrypt an entire volume, while EFS can encrypt individual files and folders. In either case, the reason for encrypting files / folders or an entire volume is that if an ... (view more)

Wed
22
Jan
John Lister's picture

Apple Drops Plan to Tighten iCloud Encryption

Reports suggest that Apple has been pressured by the FBI to drop plans to improve the security of its customer backups. The plan was to better encrypt backups on the iCloud service. iCloud serves two purposes: it's a way for Apple users to store ... data and documents online and access them from anywhere (from any Apple device) with a password; it's also a way to automatically backup the contents of iPads and iPhones. Data from the iCloud is stored on Apple servers in an encrypted format, which means that if somebody gained access to the files (either through a remote hack, or a physical breach ... (view more)

Pages

Subscribe to RSS - John Lister