hijack

Mon
17
Apr
John Lister's picture

Severe Android Voicemail Bug Hijacks Phones Remotely

Google has warned users of some Android handsets to turn off some voice call features. A series of vulnerabilities could mean attackers can compromise a handset just by knowing its phone number. The problem involves four vulnerabilities in a ... Samsung-made component called an Exynos chipset. It's used for voice calls made over mobile data rather than the voice network. At the time of writing, Google says the affected products include phones made by Samsung (A04, A12, A13, A21s, A33, A53, A71, M12, M13, M33, S22), Google itself (Pixel 6 and 7) and Vivo (S6, S15, S16, X30, X60, X70) along with ... (view more)

Mon
13
Apr
John Lister's picture

56 Android Apps Hijack Devices, Drain Battery

Security researchers have warned of 56 infected Android apps that could compromise performance. They've been deleted from the Google Play Store, but could still be on users' phones and tablets. According to Check Point, the apps contain malware ... designed to hijack phones and simulate user actions to click on ads. That could run down batteries and eat into mobile data allowances. (Source: checkpoint.com ) The 56 apps include 24 supposedly aimed at children, and 32 which offer simple utilities. They all work as designed: the problem is what's happening in the background. (Source: express.co.uk ... (view more)

Thu
21
Feb
John Lister's picture

Symantec: Popular Microsoft Apps Hijack PCs

At least eight apps in the official Microsoft Store were secretly designed to use a computer's resources without permission. It undermines Microsoft's efforts to promote the store as a "safe source of software." In the past few years, Microsoft has ... heavily pushed the idea of Windows users getting software from an app store - similar to the way mobile devices work - rather than the more traditional method of getting programs from a third-party sources and installing them directly to the PC or smartphone / tablet. There's even a special 'S' mode for Windows 10 that only allows the ... (view more)

Thu
05
Apr
John Lister's picture

Chrome Browser PC Scans Come As Surprise

Google Chrome users have been surprised to discover that the Chrome browser scans their computers in search of malware. It doesn't appear to be a reason to panic, but arguably Google could have been more up front about it. The scans were spotted by ... Kelly Shortidge who works at a cyber security company. She noticed that the chrome.exe executable file (which is visible in Windows Task Manager) was scanning files in her Windows documents folder. On further investigation, she discovered Chrome has been doing this since around October, 2017. The scans are being done through Chrome Cleanup, a tool ... (view more)

Thu
09
Nov
John Lister's picture

Chrome to Block Sneaky Web Page Popup Ads

Chrome browser users should see fewer cases of web pages unexpectedly being replaced by ads and other annoyances with some upcoming updates. The changes aim to tackle unwanted content appearing in three ways. The first change deals with the problem ... of the page the user wants to visit suddenly being replaced by another page, usually advertising and often with no clear way of going back to the desired content. This is usually caused by rogue content in code on third-party ads that are meant to appear besides the content on the original web page. Auto-Redirection Won't Work Once Chrome gets the ... (view more)

Tue
09
Nov
Dennis Faas's picture

'GPU-Z 0.4.8', and 'Hijack Hunter 1.8.4.0'

GPU-Z 0.4.8 GPU-Z is a lightweight utility designed to give you all information about your video card and GPU (graphics processing unit). GPU-Z displays overclocking information, default clocks and 3D clocks (if available). GPU-Z supports Windows ... 2000 / XP / Vista / Windows 7 (both 32 and 64 bit versions). http://www.techpowerup.com Hijack Hunter 1.8.4.0 Hijack Hunter is an application that thoroughly scans your computer and displays all the gathered data in a comprehensive way. To help the users to detect suspicious system behaviors, Hijack Hunter shows all the needed information in a report ... (view more)

Thu
16
Jun
Dennis Faas's picture

'Google Sitemaps Generator', and 'Hijack This'

Google Sitemaps Generator Google Sitemaps are an easy Google-approved way for you to help improve your coverage in the Google index. This sweet little app will generate sitemaps for you to submit to Google. ... http://www.auditmypc.com/free-sitemap-generator.asp Hijack This Homepage hijacker detector and remover. Initially based on the article Hijacked!, but expanded with almost a dozen other checks against hijacker tricks. It is continually updated to detect and remove new hijacks. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites. http ... (view more)

Thu
26
May
Dennis Faas's picture

'Browser Hijack Retaliator', and 'Fast Use'

Browser Hijack Retaliator Browser Hijack Retaliator monitors your Internet Explorer settings for Home page, Search page, Search bar and Favorites and prevents them from being changed without your consent. As soon as an application attempts to modify ... those settings, you will be alerted by a popup dialog and have the option to allow or block the change. Also you have the option to set automatic retaliation, so your intervention is not necessary. The program also provides access to cookie and cache deletion. http://www.zamaan.net.tf/ Fast Use FastUse Version 5 will give you fast access to the ... (view more)

Subscribe to RSS - hijack