Wednesday, May 7th, 2014
Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot ...
Posted in Hardware, Internet, Mobile, Security | No Comments
Wednesday, May 7th, 2014
An article in The Wall Street Journal this week quoted executives from antivirus pioneer Symantec uttering words that would have been industry heresy a few years ago, declaring antivirus software “dead” and stating that the company is focusing on developing technologies that attack online threats from a different angle.
This hardly ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, May 6th, 2014
David Sancho, senior threat researcher with Trend Micro, has recently written a short but good post in which he pointed out the reasons why despite their inherent insecurity, passwords are here to stay.
Among the advantages they offer are the fact that they can be used straight away, and ...
Posted in Internet, Privacy, Security | No Comments
Saturday, May 3rd, 2014
Yahoo is watching you, whether you like it or not.
Yahoo said this week that the company will stop honoring "Do Not Track" requests made by a user's browser. It will now actively attempt to track your interactions with its site and its content.
"Here at Yahoo, we work hard to provide ...
Posted in Internet, Privacy | No Comments
Friday, May 2nd, 2014
Following in the steps of the OpenSSL vulnerability Heartbleed, another major flaw has been found in popular open-source security software. This time, the holes have been found in the log-in tools OAuth and OpenID, used by many websites and tech titans including Google, Facebook, Microsoft, and LinkedIn, among others.
Wang Jing, ...
Posted in Internet, Privacy, Security | No Comments