access

Tue
28
Jun
John Lister's picture

Password Manager Goes Passwordless

Password manager LastPass will let users prove their identity with a biometric login rather than a master password. It could overcome one of the off-putting points for some users. Like most password managers, LastPass lets users store passwords for ... other websites in a secure vault that's encrypted in a way that means even LastPass itself can't access the information. It's protected with a master password that gives the service its name, the logic being it's the last password a user will ever need to remember. That does mean the master password needs a bit of a Goldilocks quality. It needs to ... (view more)

Fri
29
Apr
John Lister's picture

Google 'Inactive Account' Warning A Mistake

Google users have reported an unexpected message saying their account is about to be shut down. It looks like a phishing scam but appears to actually be a bug in Google systems. The reports came in a Google support thread that has now been deleted. ... More than 300 people "upvoted" the original posts, suggesting they had a similar experience. The users were confused as they received an email saying "Your Google Account will soon be considered inactive" and that if they didn't log in it would be classed as having not been used for 18 months. That was a major surprise to users ... (view more)

Mon
14
Mar
Dennis Faas's picture

How to: Reset Any Password: Windows Vista, 7, 8, 10

Infopackets Reader 'ltb223' writes: " Dear Dennis, I have a Windows 7 Pro computer which I haven't used for a long time. Now I want to use it, but I cannot remember my password. It has only one user account, so I believe I need to reset the admin ... password. Is there anyway to recover the lost password or am I stuck with reinstalling Windows and losing all previous data and programs? " My response: It's possible to reset the admin password, or any user password using a special password reset 'trick', known as the 'utilman' and 'sticky keys' exploit. This exploit ... (view more)

Wed
15
Dec
John Lister's picture

Android Scammers Try New Tactics

Google has cracked down on a key method that scammers used to distribute Android malware through the Play app store. But like a game of whack-a-mole, the scammers are adjusting their tactics for greater success. The Google change is to the way it ... handles accessibility tools on Android devices. These include screen-readers, voice input systems and other modifications for users to interact with the device. Such tools often need access to key components such as the camera, microphone or speakers, access that can be abused by malware. Google relaxes the security and permissions system on such ... (view more)

Wed
01
Dec
John Lister's picture

Android 12 Brings Incredibly Useful Privacy Tools

The latest version of Android adds several new privacy features. However, users may need to make some manual tweaks to take full advantage. The changes come in Android 12 which is rolling out to newer phones at the moment. Older models will either ... get it later on or will never be able to get it, depending on the manufacturer. The biggest change is more information about the permissions system. That's the set-up by which users don't have to give an app complete access to the hardware and software on their system. Instead they can individually grant or restrict individual permissions, each of ... (view more)

Fri
26
Nov
Dennis Faas's picture

How Thieves Use The Dark Web to Steal Your Data

We live in the age of technology where every day is full of advancements that make our lives easier. At what cost, though? Our Internet security is constantly under fire by hackers and cyber criminals using these technological advances to their ... gain. Through the dark web, a virtual underworld full of criminal activity that can be accessed using specific tools, such activity is made possible. However, many people aren't sure what the dark web actually is. According to Business Insider, it's "defined as all content hosted on darknets, or online networks that require a specific browsing software ... (view more)

Tue
10
Aug
John Lister's picture

Report Condemns Government Cyber Security

A Senate committee has slammed cyber security in eight federal government agencies. The committee said most were failing basic security standards and had shown minimal improvements since a previous report. The report comes from the Committee on ... Homeland Security and Governmental Affairs. It followed up on a similar report from another committee in 2019. Both reports looked at issues including: Whether the agencies adequately protected personal information. Whether they kept track of the various IT equipment and systems they used. Whether they installed security patches quickly enough. Whether ... (view more)

Wed
19
May
John Lister's picture

Bloggers Accused of Hacking for Opening Dropbox Link

A Californian city will pay $350,000 to two men it falsely accused of hacking its Dropbox account. Officials in Fullerton, California had actually sent a link that granted the access. The case involves two bloggers, Joshua Ferguson and David Curlee, ... who wrote about local government and regularly requested documents under public record laws. As some of these files were very large, officials would often upload them to a Dropbox folder and provide a link granting access. However, one such response in 2019 also mistakenly included a link giving access to a separate folder that included documents ... (view more)

Tue
26
Jan
John Lister's picture

Ransomware Gets Doubly Dangerous

Ransomware infections used to be about forcing victims to pay to regain access to their files. Now it appears more and more scammers are treating it as an exercise in blackmail. A new cybersecurity report says 18 known ransomware gangs have switched ... their focus to threatening to publish stolen data unless the victim pays up. That's led to some businesses paying the ransom even though they had access to backups in order to restore their files. Traditionally ransomware has been about file encryptions. Scammers get access to a victim's computer or network through malware, then the infection " ... (view more)

Wed
01
Jul
John Lister's picture

25 Android Apps Steal Facebook Passwords

Google has removed 25 malicious Android apps which tried to steal user Facebook logins. As always, it's worth checking devices to see if these apps are installed, because they won't automatically uninstall from phones even being ousted from the Play ... Store. This particular batch of apps didn't have a common subject, but each promised to carry out a basic function, including: a flashlight, file cleaner, or card game. Hidden deep inside each app was malicious software that ran behind the scenes. The malware came alive each time an app was opened on the phone, specifically checking to see if the ... (view more)

Pages

Subscribe to RSS - access