Security

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Thu
04
Oct
John Lister's picture

Google Cracks Down On Browser Scams

Google is taking several more steps to make browser extensions safer. It's giving users more control and cracking down on some common rogue practices. The changes are to Chrome's extensions. Also known as add-ons with some browsers, extensions are ... third-party tools designed to improve the online experience using a web browser. For example, an Amazon extension lets users send text on a web page (such as a lengthy article) straight to their Kindle e-reader as a document with one click. By nature, extensions need some degree of access to and control over Chrome itself, which sometimes means the ... (view more)

Wed
26
Sep
John Lister's picture

Firefox Download Bug Could Crash Windows

A security researcher has found a way to crash the Firefox browser and even Windows itself. Sabri Haddouche has demonstrated the technique to highlight the risk that it could be misused. The bug is shown off at Haddouche's site Browser Reaper, which ... he created to chart his interest in denial of service attacks. Normally such attacks involve flooding a website with bogus visits until it is overloaded and becomes unavailable to ordinary users. However, Haddouche has been exploring the technique from the other perspective: forcing a browser to deal with so much traffic that it crashes. Epic Name ... (view more)

Tue
25
Sep
John Lister's picture

Electronic Vote System Escapes Court Ban

A judge in Georgia says she is "gravely concerned" that electronic voting machines could be hacked. But she says it's too late to scrap them for this year's elections. Amy Totenberg was ruling on a lawsuit originally filed May 2017 against Georgia's ... Secretary of State. It called for the use of the Direct Recording Voting machines to be banned for the elections. Among the arguments in the lawsuit were that the system doesn't create a paper trail for verifying any discrepancies; that the software on the machine could be altered or replaced without detection; and that the system makes it ... (view more)

Wed
29
Aug
John Lister's picture

Google Warns: Major Security Flaw in Fortnite Game

The makers of the hit video game "Fortnite" have called Google irresponsible for revealing a security flaw. The controversy follows Epic Games choosing not to use the Google Play store to distribute the game. Although it's free to download and play, ... Fortnite has proved hugely lucrative thanks to in-game purchases. Although 'buying' character costumes and animations doesn't affect gameplay, gamers - many of them children - have now spent more than a billion dollars. With so much money at stake, it appears Epic Games didn't want to go through Google Play for the Android version. Had ... (view more)

Tue
21
Aug
John Lister's picture

Skype Offers Secret Calling, End-to-End Encryption

Skype has added a new "private conversations" feature. Calls made this way will be encrypted so that it's impossible for anyone to usefully intercept or listen in. The data for such calls will use end-to-end encryption. That means the data is ... encrypted on one user's device and kept that way throughout its journey over the Internet until it reaches the other user's device. If the data is intercepted, it won't be of any use. The system will work on a "conversation" basis rather than a call-by-call basis. One user must select the feature, which will then send ... (view more)

Wed
15
Aug
John Lister's picture

Mock Election Site Hacked By Pre-Teen

An 11-year-old boy hacked a replica of a Florida election website in just 10 minutes. Officials have downplayed the incident saying it's not an accurate recreation of how such hacking could work. The hack took place at DefCon, an annual conference ... for people interested in computer security. It often has competitions and demonstrations of security vulnerability - and certainly isn't a place you would want to connect your wireless device to unknown WiFi networks. One of the events at the conference was the DefCon Voting Machine Hacking Village. Participants, including many children, attempted ... (view more)

Wed
08
Aug
John Lister's picture

US Military Bans Fitness Trackers, Citing Spy Risk

The US Department of Defense (DoD) has banned military staff from using geolocation tools such as GPS-enabled fitness trackers in "operational areas." The move follows fears such data could be unintentionally public and threaten security. Earlier ... this year fitness tracker company Strava published a worldwide map showing the most popular routes for its users to run and carry out other exercise activity. The map showed routes in increasing levels of brightness depending on their popularity. Middle East Bases Unintentionally Mapped Several users then spotted several routes in countries such as ... (view more)

Thu
02
Aug
John Lister's picture

Gov't Staff Revert to Typewriters After Ransomware Attack

Staff of a local government in Alaska have switched to typewriters after a ransomware attack crippled their computer network. Officials are currently rebuilding the system from scratch. The attack hit Matanuska-Susitna Borough, which covers the ... region just north of Anchorage. The problems began on July 24, though officials believe the malware may have been on the system for several weeks before activating. IT staff spotted the ransomware attack thanks to antivirus software , but had to start manually removing some of the more sophisticated elements. They also reset all passwords as a security ... (view more)

Wed
01
Aug
John Lister's picture

Google Bans Apps That Hijack Device Resources

Google is to ban several categories of apps from its app store. They include so-called "cryptomining" apps that can suck up a resources from a device for somebody else's financial benefits. The changes come in the latest update of the Play Store ... Developer Policy. The relevant apps will no longer be available through the official Play Store, meaning that although users can still install them, they'll get much less prominence and exposure. The ban is specifically on apps that use a device's processor for mining cryptocurrencies. In very simple terms, mining involves computers racing to solve a ... (view more)

Pages

Subscribe to RSS - Security