Security

Wed
05
Jul
John Lister's picture

'LetMeSpy' Spouse Spying App Hacked

An app for spying on a partner or employee has been hacked. It means victims of the spying could face further data security threats. LetMeSpy is what the makers call a "parental control" and "employee control" and what critics call "stalkerware" or ... "spouseware". Once installed on a phone, it lets the person who installed it remotely access text messages, call logs and precise location. (Source: techcrunch.com ) The marketing is somewhat inconsistent with what the company says its intended use is for, suggesting people might put it on their own phone so that they can find the phone when lost, ... (view more)

Wed
07
Jun
John Lister's picture

60,000 Android Apps Were Malware

More than 60,000 Android apps contained a nasty piece of malware designed to steal banking information. The scam doesn't target the official Google Play store, but rather third-party sources. The rogue apps fall into two main categories. Some are ... designed to closely resemble real, popular apps. Others are promoted as "modded" versions of genuine apps that are supposedly identical but with an alteration that supposedly removes ads or a requirement to pay a subscription. In reality, the scammers have taken the genuine apps, copied them, and made one modification. Unfortunately that modification ... (view more)

Fri
19
May
John Lister's picture

One in Three Used Drives Not Secure

A data recovery firm says it found 3.1 million "deleted" files on a second-hand hard drive. It also found 35 percent of drives had readily-restorable files. The experiment by Secure Data Recovery comes with an obvious warning. It's a company that ... helps people recover deleted or corrupted files from their own drives, so it has an interest in highlighting that such recovery is possible. That said, in this experiment conducted for Tech Radar, the company only tackled those drives where recovering data proved a straightforward task. (Source: techradar.com ) This involved buying 100 hard drives, ... (view more)

Fri
05
May
John Lister's picture

'Juice Jacking' Warnings May Be Overblown

An FBI branch has warned people not to use free USB charging points as they could spread malware. The agency says it's safer to use a charger plug and power outlet. However, the FCC notes that while such attacks are technically possible, there's no ... evidence of it actually happening. The FBI Denver Officer posted on Twitter: "Avoid using free charging stations in airports, hotels or shopping centers. Bad actors have figured out ways to use public USB ports to introduce malware and monitoring software onto devices. Carry your own charger and USB cord and use an electrical outlet instead." The ... (view more)

Thu
20
Apr
John Lister's picture

Quantum Computing to Boost Security using Random Numbers

Quantum computers could produce genuinely random numbers according to new research. It could boost security, an ironic effect given fears over the ways cyber criminals could use quantum computing. In extremely simplified terms, a quantum computer ... uses quantum physics in which something can exist in more than one state at a time. That's in contrast to traditional computing where data is stored in bits that represent either a 0 or a 1 at any given time. To date, the main claimed advantage of quantum computing has been processing speed. The same "bit" representing multiple states removes a ... (view more)

Mon
17
Apr
John Lister's picture

Severe Android Voicemail Bug Hijacks Phones Remotely

Google has warned users of some Android handsets to turn off some voice call features. A series of vulnerabilities could mean attackers can compromise a handset just by knowing its phone number. The problem involves four vulnerabilities in a ... Samsung-made component called an Exynos chipset. It's used for voice calls made over mobile data rather than the voice network. At the time of writing, Google says the affected products include phones made by Samsung (A04, A12, A13, A21s, A33, A53, A71, M12, M13, M33, S22), Google itself (Pixel 6 and 7) and Vivo (S6, S15, S16, X30, X60, X70) along with ... (view more)

Thu
30
Mar
John Lister's picture

Email Malware Returns With New Tricks

A notorious botnet that spreads malware through fake emails is back in action. Emotet has returned with some new tactics to try to bypass security checks. Emotet had already gained a reputation for being (comparatively) successful at fooling humans ... and computers alike. Its most notable characteristic was that it not only used messages that appeared to come from a trusted contact, but that it addressed the recipient by name and even appeared to be a reply to a previous genuine message. Most commonly, Emotet sends malware through Microsoft Word documents with macros. These are now disabled by ... (view more)

Fri
03
Mar
John Lister's picture

Samsung Tackles 'Zero-Click' Malware

Samsung's flagship phone is getting special protection against a particularly nasty form of mobile malware. It combats zero-click attacks, which can steal data or compromise a handset without needing any action by the user. The hacking technique ... hasn't been widely seen in real-world attacks on Android phones, though Samsung claims it has worked on Apple devices. Samsung clearly believes it's just a matter of time before attackers find a vulnerability that would make such an attack almost irresistible. The company explains that a zero-click attack would exploit such a vulnerability by sending ... (view more)

Tue
14
Feb
John Lister's picture

FBI Hits Ransomware Gang

The FBI says it disrupted a major ransomware network that had already taken around $100 million in payments. It says its work to infiltrate the Hive group saved a potential $130 million in future demands. The group is said to have compromised ... networks run by hospitals and schools among other organizations. The $100 million compares with an estimated annual total of $886 million payments in the US across all ransomware attacks. (Source: nbcnews.com ) Scammers Pay Royalties Hive is one of the more notorious "ransomware-as-a-service" groups. Its business model means individual attackers will use ... (view more)

Fri
10
Feb
John Lister's picture

Android To Block Older Apps

The next version of Android may make it much harder to install and run apps from third party sources. The change will mainly affect older apps that haven't been updated in some time. Unlike with Apple's iPhones, Android handsets aren't restricted to ... apps from the official App Store. Users may either use other app stores (other than the Google Play Store), or download and manually install apps from the web in a process known as "sideloading." Doing this doesn't require any "hacking" of the device, though users do have to change the phone's settings and confirm they understand the ... (view more)

Pages

Subscribe to RSS - Security