John Lister

Tue
12
Nov
John Lister's picture

Google Play to Use Third Party Security to Scan Apps

Google is to use outside help to scan apps before they go into the Google Play store. It says the move is needed to cope with the continuing increase in the number of rogue Android apps. Just two weeks ago, 21 Android apps were reported to be rogue ... ; in early September, 24 apps were found to be rogue . The new "App Defense Alliance" involves Google working with three security companies, namely: ESET, Lookout and Zimperium. They all specialize in mobile security with a particular emphasis not just on spotting individual rogue apps, but on figuring out common characteristics and clues ... (view more)

Thu
07
Nov
John Lister's picture

Chromium-based Edge Browser to Launch January 2020

Microsoft's revamped version of the Edge browser will launch on January 15, 2020. It's based on the same code as Google's Chrome and will be able to run Chrome extensions. Designed as a replacement for the much maligned Internet Explorer, Edge ... debuted with the release of Windows 10 back in July, 2015. The original version was built from scratch using Microsoft's own browser engine, which is the component that turns a web page's code into what users actually see on the screen. The new edition isn't simply an update but rather a complete rebuild. It will now use code and ... (view more)

Wed
06
Nov
John Lister's picture

Firefox to Block Infuriating Notification Requests

Mozilla is reducing the likelihood Firefox users will be bothered by website notification requests. It will make browsing a lot less frustrating, but will upset some website owners. What are Website Notifications? Notifications in web browsers work ... in a similar way to notifications from apps on a mobile phone or tablet. As an example, a user of a streaming video site might agree to accept browser notifications. They could then get notifications whenever the site adds a new episode of a TV series they've previously watched on the site. On Windows 10, this notification might appear in the ... (view more)

Tue
05
Nov
John Lister's picture

Explained: What is Mesh WiFi? vs Extender, Router?

Ask online about ways to improve the Internet connection around your home, and you'll often come across users recommending that you use a "mesh WiFi" system. So, what is mesh WiFi? Is mesh WiFi better than regular WiFi? What about mesh vs an ... extender, or mesh vs a router? How does mesh compare to Google Nest? How do you set up a mesh Wifi network? We'll answer those questions and more below. Related: How to Fix: Stop Neighbors Stealing My WiFi Related : Are you looking for the best possible way to extend the WiFi signal in your home , but don't have the technical expertise? Tired of ... (view more)

Thu
31
Oct
John Lister's picture

Google Stops Indexing Adobe Flash Content

Google has taken yet another step to try to kill off Adobe Flash. The move will dramatically reduce the visibility of Flash content in its search results. Adobe Flash was once innovative and the primary way for delivering animated and interactive ... content online, including online-based browser games and even advertisements. Even so, many web designers seemed more interested in showing off their creativity with Flash rather than making a usable and useful site. Adobe Flash Security Bugs Severe As far back as 2010, Apple made the decision to ditch Flash entirely from its devices - a move that ... (view more)

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Tue
29
Oct
John Lister's picture

21 Rogue Android Apps Need Removing

Security researchers have exposed more than 20 rogue Android apps that secretly load ads as part of a scam. The rogue apps perform their advertised tasks for cyber criminals, but also drain batteries and overheat phones in the process. It's another ... embarrassment for Google as all the apps were found in the official Google Play Store, which is designed to vet apps to reduce the chances of malicious activity. Remove These Rogue Android Apps Now Researchers at ESET antivirus say they found 42 apps have been part of an orchestrated campaign running since July last year. They were able to ... (view more)

Thu
24
Oct
John Lister's picture

Facebook Faces $35B in Facial Recognition Lawsuit

Facebook is set to face a $35 billion class action lawsuit over claims it used facial recognition tools without permission. The case will proceed despite Facebook's protest that no one suffered direct financial losses. The case is taking place in ... Illinois, where three individual lawsuits from 2015 were combined into a single class action case. It's based on Facebook using automated recognition on uploaded photographs. The way it works is like this: let's say that Bob uploads a photograph to Facebook, which also includes his friend Alice. After the upload is complete, Facebook scans the ... (view more)

Wed
23
Oct
John Lister's picture

Microsoft Unveils New 'Secured-core' PC Protection

Microsoft is working with PC makers to tackle malware that strikes before Windows is loaded into memory. It's adapting a technology currently used for the Xbox games console. The "Secured-core" initiative is designed to overcome a big limitation ... with most Windows security tools: they only work once Windows is already running. That doesn't tackle malware that targets the computer's firmware. This is software, usually called BIOS or UEFI, than runs immediately when a PC is switched on. Its main role is to check all the hardware is in place and connected, then load up the operating system such ... (view more)

Tue
22
Oct
John Lister's picture

Samsung Fingerprint Scanner Has Major Flaw

Samsung has issued a security fix after revelations of a major flaw in its fingerprint sensor. It affects users who have added a silicone screen protector. The fix came after a British woman contacted a newspaper to report that not only could she ... unlock her phone with the "wrong" fingerprint, but her husband could also unlock it with his finger. That's a major problem as she was using a Galaxy S10, a high-end Samsung phone that lets users set up fingerprint recognition not only to unlock the phone, but also to login to apps and even authorize mobile payments. (Source: bbc.co.uk ) Scan ... (view more)

Pages

Subscribe to RSS - John Lister