Security

Thu
13
Dec
John Lister's picture

Android Ad Scam Hijacks Phones; Drains Data, Battery

22 Android apps are eating up data allowances to benefit scammers at the expense of phone owners, a security firm says. The apps are using smart phones to carry out fraud against online advertisers. Sophos says it's found 22 offending apps with a ... total of two million downloads. They are each described as offering simple games or basic utilities such as keeping the phone's flash activated to act as a flashlight. While they work as described, which helps get good online reviews and build credibility, the scam is happening behind the scenes. (Source: sophos.com ) The apps are used for click ... (view more)

Thu
06
Dec
John Lister's picture

Quora Site Hacked; Names, Emails and Passwords Stolen

Question site "Quora" has become the latest high-profile hacking victim, with details of more than 100 million users breached. Fortunately, the implications likely won't be as serious as some previous hacks. The site lets users post questions and ... then get answers from other users. A voting system means more helpful answers from its community means the best answers float to the top. Quora says its systems were accessed without authorization and that it discovered the breach on November 30, 2018. It says the exposed information included account information such as name, email address ... (view more)

Thu
29
Nov
John Lister's picture

Web Users Warned Over Browser Green Padlock Trickery

Security researchers have warned that nearly half of all phishing sites falsely display the browser padlock symbol commonly associated with secure websites. It's a reminder that the browser padlock symbol only covers one aspect of security. Most ... major browsers display the padlock symbol when a website uses a technology, most commonly Secure Sockets Layer (SSL), to encrypt data as it passes between the user's computer and the website, or vice versa. Such sites have an address starting "https://" rather than "http://". The purpose of the padlock symbol is to indicate to the user that the ... (view more)

Thu
22
Nov
John Lister's picture

Microsoft Moves Towards Password-Free Logins

Microsoft has announced several steps towards a world without passwords. It not so much a revolution at this stage, compared to a few measures towards convenience. The changes involve the way people login to Microsoft services such as the online ... edition of Office, Skype, Edge browser and the Xbox Live gaming service (on PCs) - all of which work via a single Microsoft account. Microsoft is building on "Windows Hello," an existing system for logging into a Windows 10 PC using a PIN code, facial recognition or a fingerprint reader, rather than relying on a password. Physical Keys An ... (view more)

Fri
09
Nov
Dennis Faas's picture

How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam)

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my ... phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 USD. How can they hack my phone like this? Can they hack my PC too? Should I be worried? " My response: This is yet another version of the same scam that is currently going around the Internet. Related: How to Fix: Hackers ... (view more)

Thu
08
Nov
John Lister's picture

Hackers Sell Stolen Facebook Messenger Messages

Facebook messages are being sold online for the equivalent of 10 cents per user. It comes as the company unveils an "unsend" feature for messages sent in haste. The message for sale follows a breach of Facebook last year when hackers were able to ... take advantage of a security flaw to gain access to 50 million accounts. Ironically the hack took advantage of a 'View As' feature that's meant to protect privacy by allowing users check which parts of their account and data are publicly viewable. 81,000 Users Hit By Message Leak The offer on a hacker forum claims to include details of some ... (view more)

Tue
06
Nov
John Lister's picture

CPU Hyper-threading Reverse Engineered to Spy on Processes

One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information. All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the ... computer that physically carries out these calculations. Each modern-day CPU has one or more cores , which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task. Many processors also use a technique called ... (view more)

Mon
05
Nov
John Lister's picture

Facebook Ads Falsely Labeled 'Approved By' US Senators

A report suggests that Facebook approved advertisements falsely claiming to be paid for by each of the 100 sitting US Senators. The VICE News investigation uncovered a major loophole in what was meant to be a transparency measure. Following ... revelations of Russian interference with bogus posts and ads designed to disrupt the US political system, Facebook brought in several measures to restrict who is allowed to post such ads. One such measure was a new rule stating that any political ad must carry the name of the person who has paid for it, similar to the rules on broadcasting. The rule also ... (view more)

Wed
31
Oct
John Lister's picture

Windows Defender Gets 'Sandbox' Protection

Microsoft is beefing up Windows Defender, the built-in antivirus and antimalware security tool in Windows 10. It's now using the same sandbox technology that's used in other tools, including some major web browsers. The concept of a sandbox is taken ... from the child's play area of the same name. It's a metaphor about the way the child has an area to play in freely and do what they like, but also has clearly defined boundaries. Fortunately, computer code tends to follow instructions better than a child told to stay in the sandbox. In computing terms, the sandbox is a concept about access that ... (view more)

Thu
25
Oct
Dennis Faas's picture

How to Fix: Hackers Hacked My Email, Demand Bitcoin (Scam)

Infopackets Reader Sam G. writes: " Dear Dennis, I get emails from hackers a few times a week saying that they have cracked my email account. As proof, they have supplied me with the correct password for the account. The message goes on to say that ... they have planted a Trojan on my computer which allows them to spy on me. Here's where it gets interesting. The hackers say I have been visiting websites of people in the buff. They are demanding I pay them bitcoin (worth $831) to keep this quiet, otherwise they will send images from the purported site I've visited and also a picture of me on my ... (view more)

Pages

Subscribe to RSS - Security