Articles

Mon
18
Mar
John Lister's picture

Security Experts Call for Ransomware Payment Ban

A former cyber security chief says governments should ban organizations from paying money to ransomware gangs. Ciaran Martin likened such payment to bans on paying terrorist kidnappers. The call has had a mixed response, with critics calling it an ... unfair constraint on business freedoms. Martin was the first head of the United Kingdom's National Cyber Security Centre. That's an organization overseen by the country's intelligence services that advises businesses and the public on cyber security threats. Ransomware has become a business worth an estimated $20 billion a year to criminals who gain ... (view more)

Fri
15
Mar
John Lister's picture

Google To Weed Out Low Quality Sites

Google says its next search algorithm update will dramatically reduce the number of low quality results people see. It's particularly targeting sites that prioritize getting high search rankings over providing useful content for readers. The company ... says tests of the new algorithm showed that, when combined with a similar update in 2022, it reduced "low-quality, unoriginal content in search results by 40%." Of course, that measurement involves a subjective measure of what content qualifies as low-quality. (Source: gizmodo.com )) Quality Over Quantity According to Google, the algorithm update ... (view more)

Wed
13
Mar
John Lister's picture

Windows Bug Exploited For Six Months

A Windows bug patched last month had been exploited for six months by hackers linked to North Korea. Microsoft reportedly knew about it and the delay in fixing it may have been down to internal bureaucracy. Security company Avast found the bug last ... August and reported it to Microsoft. At the time it was already a zero-day bug , meaning there was evidence hackers not only knew about the bug but where taking advantage of it. That meant Microsoft had "zero days" head start in coming up with a fix and rolling it out before hackers exploited it. Microsoft released a fix in the February "Patch ... (view more)

Mon
11
Mar
John Lister's picture

Supreme Court Debates Site Moderation vs Censorship

Two state laws governing the way social media companies moderate content could be under threat. Questioning by Justices in a Supreme Court cases suggested they may not be convinced the laws are constitutional. The case, examining laws in Florida and ... Texas, covers one of the most longstanding dilemmas of the Internet age: whether website owners are publishers or a platform. This affects questions such as whether the site owner is responsible for defamation or other breaches of the law involving content, plus the extent to which the First Amendment applies. In this case, both states brought in ... (view more)

Fri
08
Mar
John Lister's picture

Processor Breakthrough Could Double Speeds

A new approach to computer processing could double speeds while halving power consumption, according to researchers. The approach could work on existing hardware without needing physical modifications. The research builds on the existing technique ... of multithreading. That's an attempt to overcome the major limitation of computer processors (CPUs). They are broken down into cores (often 2, 4 or 8 cores) but each core can only carry out one task at any specific split-second. Workload Optimized Threading means breaking bigger tasks down into a list of individual steps known as a thread. The ... (view more)

Wed
06
Mar
John Lister's picture

Transparent Laptop Display Raises Eyebrows

Lenovo has designed a laptop with a see-through display. But it's pretty transparently a gimmick. The company demonstrated the screen at the Mobile World Congress in Barcelona, an annual trade show where tech companies often unveil their latest ... ideas for portable gadgets. The technology behind a transparent display isn't particularly new. Generally they work by blocking or reflecting light to create an image, rather than emitting light as happens with traditional displays that are black when not in use or showing a "blank" image. The main use of the Lenovo "Project Crystal" display is for ... (view more)

Mon
04
Mar
John Lister's picture

Apple Updates 'Wet Phone Fix' Advice

Apple has warned users not to dry an iPhone in a bag of rice. It says the popular "tip" won't repair water damage and could cause even more problems. Numerous online guides have suggested the fix in cases where a phone is dropped into water and ... stops working. They usually suggest putting the phone in a zip-lock bag with uncooked rice, the logic being that the rice will absorb moisture, eventually drying out even the inside of a phone. Apple has now updated its official advice to include examples of what not to do: Don't dry your iPhone using an external heat source or compressed air. Don't ... (view more)

Fri
01
Mar
John Lister's picture

Android Malware Targets Banking Apps

The latest malware targeting banking users may have infected up to 200,000 Android devices. The criminals behind Anatsa have deliberately exploited what's meant to be a useful feature that makes users' lives easier. The attacks have some familiar ... features such as distributing the malware through free tools that perform some basic functions and finding ways around the Android permission system. What makes it a particularly nasty campaign is that it takes advantage of the Android Accessibility system. Security researchers at ThreatFabric spotted the malware in five apps with similar names: ... (view more)

Mon
26
Feb
John Lister's picture

TikTok Accused of Fueling Addiction

TikTok is under formal investigation for allegedly deliberately making its service addictive. It's the first test of how laws banning such behavior will operate. The Chinese-owned video company is controversial on both sides of the Atlantic. In the ... US, many federal and state agencies ban employees from using TikTok over security concerns, with Montana even attempting to ban it from the state altogether. (Source: guardian.com ) Now the European Commission says it has enough evidence from a preliminary investigation to move to formal proceedings against the company. It involves several alleged ... (view more)

Fri
23
Feb
John Lister's picture

Patch Tuesday a Must Install This Month

Microsoft has fixed two bugs which bypassed Windows security measures. Both were actively exploited before the fix, making it vital to install the updates. The fixes come in this month's "Patch Tuesday" update, the main monthly security update that ... Microsoft officially calls the "B update". It should download and install without further action for anyone with automatic updates switched on, but may need a reboot to complete. Both bugs affect most supported versions of Windows, including 10, 11 and Windows Server. Microsoft rates the two bugs as "important" and "moderate" respectively, though ... (view more)

Wed
21
Feb
John Lister's picture

Triple-Display Phones On Way

Phone screens that fold in half may soon be yesterday's news. Two smartphone giants are both reportedly working on triple foldable phones. Huawei and Samsung have both previously filed patents for relevant technology. Now reports suggest Samsung ... will release a model later this year while Huawei may beat it to the punch with a release somewhere between April and June. The reports have been fuelled partly by orders placed with component manufacturers in Taiwan. (Source: pandaily.com ) While Huawei may be first to market, Samsung would have a major advantage in the US market. That's because the ... (view more)

Mon
19
Feb
John Lister's picture

Fake LastPass Gets Vetted by App Store

A fake app pretending to be from password manager LastPass not only made it into the Apple App Store but had a five star rating. It's arguably among the worst possible types of bogus app to bypass Apple's usually strict vetting process. LastPass is ... one of the best known password manager tools. It lets users store their passwords in an encrypted vault, accessible only with a master password. The service can also generate secure passwords. The company's name is based on the idea that the master password is the last password the user will ever need to create or remember. The big catch, of course ... (view more)

Fri
16
Feb
John Lister's picture

Toothbrush Botnet Army Story Was Bogus

Reports that 3 million "smart" toothbrushes were hacked and weaponized turn out to be misleading at best. It appears to have been a mistranslation or misunderstanding. The reports first surfaced last week in Switzerland and involved toothbrushes ... supposedly running the Java computer language. They were said to have been hacked and used for a distributed denial of service (DDoS) attack that caused huge disruption and financial costs to a targeted business. Not every element of the story is as completely ridiculous as it might seem. "Smart" toothbrushes do exist, with connections to smartphone ... (view more)

Wed
14
Feb
John Lister's picture

Google Ads Breached by Phone Carrier Scam

Google has shown bogus ads for a scam website at the top of its results page according to a consumer group. The ads had somehow bypassed checks designed to make sure only legitimate businesses appear in the "sponsored" section of the results. These ... results, labeled as sponsored, appear at the top of the rankings. They come above the "organic" results which are based on Google's algorithm that takes into account factors such as the relevance of a page to the search term, the authority and expertise of the creator, and whether people who click on the result quickly return to the search results ... (view more)

Mon
12
Feb
John Lister's picture

Liquid Metal Could Transform Computer Memory

Researchers in China have found a way to make flexible computer memory using liquid metal. It could one day revolutionize the physical design of computer devices. Anyone who has handled either internal computer RAM or a flash memory device will know ... that bending them even slightly would not end well. That's partly because the electronics is housed on often-brittle plastics, but partly because those electronics need to be flat and inflexible themselves. In very simple terms, RAM uses flat, two-dimensional electronic grids. Each point where a horizontal and vertical line crosses is a cell that ... (view more)

Subscribe to Articles