Wednesday, February 4th, 2015
A vulnerability in fully patched versions of Internet Explorer allows attackers to steal login credentials and inject malicious content into users' browsing sessions. Microsoft officials said they're working on a fix for the bug, which works successfully on IE 11 running on both Windows 7 and 8.1.
The vulnerability is known ...
Posted in Internet, Privacy, Security, Windows | No Comments
Sunday, February 1st, 2015
For additional security, you can require a time-based authentication token as well as a password to log into your Linux PC. This solution uses Google Authenticator and other TOTP apps.
This process was performed on Ubuntu 14.04 with the standard Unity desktop and LightDM login manager, but the principles are the same ...
Posted in Linux, Privacy, Security | No Comments
Thursday, January 29th, 2015
At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered.
Todor Donev, a member of the Ethical Hacker research team, says that ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, January 29th, 2015
A new Chrome extension highlights tools embedded in websites that could pose privacy risks by sending data unencrypted over the Internet.
It's hard to find a major website that doesn't use a variety of third-party tracking tools for online advertising, social media and analytics. But if the trackers send data unencrypted, ...
Posted in Internet, Privacy | No Comments
Thursday, January 22nd, 2015
Mobile banking is an increasingly popular way to stay on top of one’s finances, with the ability to check balances, transfer money and even deposit checks virtually. Unfortunately, the sector is also a rich tapestry of criminal activity, with 11% of mobile banking apps categorized as “suspicious.”
According to research findings ...
Posted in Internet, Mobile, Privacy, Security | No Comments