hackers

Wed
13
Mar
John Lister's picture

Windows Bug Exploited For Six Months

A Windows bug patched last month had been exploited for six months by hackers linked to North Korea. Microsoft reportedly knew about it and the delay in fixing it may have been down to internal bureaucracy. Security company Avast found the bug last ... August and reported it to Microsoft. At the time it was already a zero-day bug , meaning there was evidence hackers not only knew about the bug but where taking advantage of it. That meant Microsoft had "zero days" head start in coming up with a fix and rolling it out before hackers exploited it. Microsoft released a fix in the February "Patch ... (view more)

Tue
25
Jul
John Lister's picture

Google to Block Internet for Some Employees

Google will stop some of its employees accessing the Internet. It's a bold experiment to see if it can reduce security threats without affecting performance. The idea is reduce the risk of hackers getting access to employee machines, either to get ... hold of data on those machines or to use them as an entry point into Google's network. Perhaps unsurprisingly, Google's internal data is particularly attractive to attackers, whether they are seeking financial gain, political or commercial advantage, or plain old mischief making. For example, attackers being able to find out how Google ranks ... (view more)

Mon
13
Dec
John Lister's picture

Microsoft Uses US Courts to Disrupt Chinese Hackers

Microsoft has taken control of websites - or rather their domain names - believed to be uses by Chinese hackers. It's the latest example of a tactic that overcomes the usual problems of dealing with an international online threat. According to ... Microsoft, the "Nickel" group is based in China and is a "nation-state actor": in other words, it at the very least has the backing of the Chinese government. It uses a variety of tactics to try to spy on victims and intercept their data. Targets include government agencies and human rights groups. Microsoft somewhat understatedly says there's "often a ... (view more)

Fri
26
Nov
Dennis Faas's picture

How Thieves Use The Dark Web to Steal Your Data

We live in the age of technology where every day is full of advancements that make our lives easier. At what cost, though? Our Internet security is constantly under fire by hackers and cyber criminals using these technological advances to their ... gain. Through the dark web, a virtual underworld full of criminal activity that can be accessed using specific tools, such activity is made possible. However, many people aren't sure what the dark web actually is. According to Business Insider, it's "defined as all content hosted on darknets, or online networks that require a specific browsing software ... (view more)

Mon
20
Sep
John Lister's picture

Apple Patches Critical Image Preview Bug

Apple has patched a security flaw that could compromise phones and tablets just by users receiving a message. The exploit would use an attachment in iMessages but wouldn't require the user to click or open it. It's a potentially very serious flaw ... though ironically that may be the saving factor for most ordinary users. Because it's so serious, experts believe it's most likely to be used for highly targeted attacks. The bug was discovered by researchers at the University of Toronto, who say it's an example of "zero-click spyware". While they've seen similar attacks on Apple devices before, it's ... (view more)

Fri
09
Apr
John Lister's picture

500M Phone Numbers Exposed in Facebook Leak

A data leak has exposed the phone numbers of an estimated 500 million Facebook users. The data comes from a breach in 2019, but has just been made public. According to Facebook, the breach was "found and fixed" in 2019, which has raised some ... eyebrows given the company never warned users their details may have been compromised. It argues the data wasn't hacked but rather "scraped" from publicly accessible information through a bug in its feature that lets users find the Facebook accounts of people in their phone contacts. That may not be enough to satisfy data protection officials in several ... (view more)

Tue
12
Jan
John Lister's picture

100M Users Still Using Windows 7

As many as 100 million PCs could still be running Windows 7 according to a newly-published estimate. That's despite Microsoft withdrawing support for the 11-year old system last year. The estimate comes from Ed Bott of ZDNet and is based on data ... published at analytics.usa.gov. That brings together site visitor data from most US government agencies. It means the figures will primarily represent visitors from the United States. (Source: zdnet.com ) Bott notes that across the agencies, 8.5 per cent of visitors in the past 90 days were running Windows 7 and 3.4 percent running Windows 8 or 8.1. ... (view more)

Wed
14
Oct
John Lister's picture

Microsoft, Military Tackle Bonet Preceding Elections

Microsoft says it has disrupted "one of the world's most persistent malware operations." The action against "Trickbot" reportedly involved working with the US military. Trickbot is a botnet , created by infecting computers with malware then ... hijacking and combining their resources for further malicious activity. The operators largely built it using bogus emails that tricked users into opening a file attachment or clicking a link that downloaded and installed malware. The uses of Trickbot have included stealing login details such as online banking credentials; accessing sensitive data; and ... (view more)

Tue
08
Sep
John Lister's picture

1/4 of PCs Running Win7 Despite Security Risks

More than one in four computers are running an unsupported version of Windows according to the latest monthly estimates. Around one in 80 machines are still running Windows XP, which was first released 19 years ago. The stats, spotted by TechRadar, ... come from Net Market Share. That's a company which provides statistics and analysis to websites. As part of this work, it's able to track the operating systems of sites that visit its clients sites. (Source: techradar.com ) Net Market Share believes it has data from enough sites to make reliable estimates for the Internet as a whole. If anything, ... (view more)

Wed
12
Aug
John Lister's picture

1 Billion Android Phones At Risk due to CPU Flaw

Security researchers spotted a major flaw in a processor that's in more than a billion Android phones. It's been fixed now, but highlights the importance of a couple of key security measures users should take. Researchers at Check Point say they ... spotted the errors on a processor from Qualcomm that's used on more than 40 percent of cellphones. The processor is known as a "system on a chip" (SoC) because it combines hardware and software in a single unit. The processor controls some key functions on a phone including charging, video and audio. Because it's a system on a chip, it runs partially ... (view more)

Pages

Subscribe to RSS - hackers