Security

Wed
03
Feb
John Lister's picture

iPhone Allows Facial Unlock While Wearing Mask

Apple is to let iPhone owners unlock their phone using Face ID even while wearing a face mask. But the setting is only available to people who also use an Apple watch. Facial recognition is now the primary way to unlock an iPhone rather than use a ... fingerprint or typing in a code. That's proven problematic in a time when people are increasingly wearing face masks in public places as a measure to reduce the risk of transmitting diseases. Unlocked Watch Allows Masked Match It was technically possible for Apple's system, Face ID, to "recognize a face" using a combination of the exposed top half ... (view more)

Tue
26
Jan
John Lister's picture

Ransomware Gets Doubly Dangerous

Ransomware infections used to be about forcing victims to pay to regain access to their files. Now it appears more and more scammers are treating it as an exercise in blackmail. A new cybersecurity report says 18 known ransomware gangs have switched ... their focus to threatening to publish stolen data unless the victim pays up. That's led to some businesses paying the ransom even though they had access to backups in order to restore their files. Traditionally ransomware has been about file encryptions. Scammers get access to a victim's computer or network through malware, then the infection " ... (view more)

Wed
30
Dec
John Lister's picture

Security Update Cut-Off Puts Phones At Risk

A consumer group has warned a time limit on updates could mean phones become a security risk before they wear out. The group wants laws to make it clearer how long devices will receive support. The warning comes from Which?, a British organization ... similar to Consumer Reports in the US. It surveyed 15,000 people about how long they kept their phones. The questions covered how long people had been using their current phone, whether it was newly manufactured when they got it, and how long they had used their previous handset. The calculations only took account of handsets that were replaced ... (view more)

Mon
30
Nov
John Lister's picture

Retirees Biggest Losers to Phone and Cyber Scams

Millennials are much more likely to be scammed out of money online or over the phone than retirees according to FTC figures. However, an elderly victim is likely to lose a much bigger sum. The figures come from analysis of Federal Trade Commission ... (FTC) data by Atlas VPN. They found that in almost every age group, more people have been scammed so far this year than in the same period last year, but the average loss is lower. That could simply be scammers making smaller demands because they know many people have less disposable cash this year. (Source: atlasvpn.com ) Elderly Targeted By Phone ... (view more)

Thu
12
Nov
John Lister's picture

Beware of Bogus Microsoft Teams 'Update'

If you use Microsoft Teams, watch out for bogus advertisements offering an "update". It's a scam designed to install malware that tries to steal personal data. The group chat and video conferencing tool has understandably become more popular this ... year with the increase in remote desktop connections to workplaces. That's attracted the attention of scammers who have put together a creative strategy to steal data. It's important to note that the attack doesn't aim to exploit any vulnerability in Teams itself. Instead, it's simply aimed at people using it, particularly those who have only started ... (view more)

Wed
28
Oct
John Lister's picture

Zoom to Completely Encrypt Video Calls

Zoom is to completely encrypt video calls at all times for most users. It will mean neither Zoom itself nor law enforcement agents or security services can access the content of calls. At the moment, Zoom encrypts the data that flows between ... individual participants on a call. However, it's Zoom's own servers which generate the encryption key issued to each participant. That means it's technically possible for Zoom to decrypt calls. While Zoom insists it's never had any intention of doing so, it does leave it open to pressure or legal threats from law enforcement officials to get access to ... (view more)

Thu
22
Oct
John Lister's picture

Adblockers Hijacked To Snoop On Users

Two ad-blocking Chrome extensions have been removed from distribution after they were altered to collect user data. People who've already installed Nano Adblocker and Nano Defender should now remove the tools. Instructions for removal are near the ... end of the article. Both Nano Adblocker and Nano Defender started out as legitimate extensions which users could integrate into the Chrome browser to block ads. They had a combined total of 250,000 downloads, and ironically that success seems to be what ended up causing the problems. New Owners Manipulate Extension The original developer sold the ... (view more)

Wed
14
Oct
John Lister's picture

Microsoft, Military Tackle Bonet Preceding Elections

Microsoft says it has disrupted "one of the world's most persistent malware operations." The action against "Trickbot" reportedly involved working with the US military. Trickbot is a botnet , created by infecting computers with malware then ... hijacking and combining their resources for further malicious activity. The operators largely built it using bogus emails that tricked users into opening a file attachment or clicking a link that downloaded and installed malware. The uses of Trickbot have included stealing login details such as online banking credentials; accessing sensitive data; and ... (view more)

Wed
07
Oct
John Lister's picture

Google Launches App Security Team

Google is creating a dedicated security team to hunt for bugs in "sensitive" Android apps. It will concentrate on the nature of the app rather than how widely its used. The new team will working in a different way to Google's existing program that ... offer bounties to independent security researchers who spot bugs in apps from the Google Play Store. To get the most "bang for its buck," that program only covers apps which have more than 100 million downloads. While it's logical enough to prioritize those apps as the number of people affected by a security breach will be highest, it doesn't take ... (view more)

Thu
01
Oct
John Lister's picture

COVID-19 Changes Ransomware Tactics

COVID-19 hasn't had much direct effect on the world of malware, but it may be why ransomware scams are getting scarily efficient. So says Microsoft in its latest "Digital Defense Report." The report is based on Microsoft's experiences through its ... built-in and standalone security measures on consumer and business devices and networks. It covers the year from July 2019 though June 2020. (Source: microsoft.com ) Microsoft suggests COVID-19 itself hasn't made much difference to most forms of malware. That's something of a surprise given more people are working from home and thus sending ... (view more)

Pages

Subscribe to RSS - Security