Hacker discovers Gmail vulnerability that leaves any account open to compromise

Gmail app logo on Google Nexus 5

A student and security researcher from Pakistan has found a serious issue with Gmail that makes it possible for a hacker to take over any email address.

The vulnerability relates to the way Google handles the linking of a primary Gmail account to another email address for the purposes of message forwarding. In just a few steps it was -- before Google fixed the problem -- possible to take over ownership of an email address by tricking the system into sending out the necessary verification code.

Continue reading

Google: HTTPS usage is rising among Chrome users

https

Google is actively pushing websites to embrace HTTPS, going as far as to warn Chrome users when they visit a page that can transmit sensitive data over the unsecured HTTP protocol. The search giant hopes that this will speed up HTTPS adoption, and to help us keep track of how things evolve it has updated its Transparency Report to reveal how HTTPS usage is increasing among Chrome users.

Google says that the majority of pages that Chrome users access on desktops are now loaded via HTTPS, and two thirds of their time is spent on pages loading the secure communications protocol. The platform with the highest rate is Chrome OS, which is approaching the 75 percent mark.

Continue reading

New solution aims to stop phishing attacks in their tracks

Phishing

We know that phishing is on the increase  and that attacks are becoming ever more sophisticated.

The Anti-Phishing Working Group (APWG) found more than 460,000 unique phishing sites in the second quarter of 2016 alone, up 61 percent over the previous quarter and almost three times the number observed in the fourth quarter of 2015.

Continue reading

LastPass is now available for free on smartphones, tablets and PCs

LastPass free

If you have considered LastPass in the past and deemed it too expensive it is now time to take another look at the popular service, as the password manager is finally offered for free across all types of devices it supports -- PCs, tablets and smartphones. Gone are the annoying limitations of before.

Previously, users who wanted to take advantage of the LastPass free plan were limited to syncing passwords only between devices of the same type -- for instance, only PCs. This was not only impractical, as few of us use only smartphones or PCs, but also a serious reason to give up on LastPass -- or free password managers altogether, for that matter. The move to a completely free LastPass is a big change in the right direction, however.

Continue reading

Off-the-shelf Android spyware targets high level executives

Mobile spy CCTV

The increasing commoditization of malware means that you no longer need to be a technical expert to launch an attack. You can simply buy the tools off the shelf.

Researchers at Skycure Research Labs have uncovered just such an off-the-peg spyware attack targeting senior company executives.

Continue reading

Kaspersky tells ransomware victims not to pay up

business man hand up refusal no

If your organization ever gets infected by ransomware (and there are good chances it will) it is better not to pay up because you probably won’t get your data back, even if you do pay the ransom.

This is according to a new report by security firm Kaspersky Lab, which urges organizations to instead report the incident to the authorities. It bases its conclusions on a couple of research results -- more than a third (36 percent) of organizations pay the ransom, but around 20 percent still don’t get their files back.

Continue reading

Datto launches new ransomware protection for SMBs

Ransomware

We already know that ransomware is a lucrative business for the attackers. But for the victims, especially smaller businesses, it can prove devastating.

A new solution offering enterprise-class ransomware protection for small and mid sized companies is being launched by data protection specialist Datto. In the event of an attack it aims to shorten downtime, save money and reduce the impact to business, giving companies an effective and reliable alternative to paying hackers' ransoms.

Continue reading

New platform improves accuracy of behavioral attack detection

Cyber attack

As cyber attacks get more sophisticated, so being able to spot them requires a different approach from simply looking for signatures.

Behavioral detection company LightCyber is launching a new version of its Magna platform that increases the precision and speed of detecting an in-progress attack from either a malicious insider or external bad actor.

Continue reading

Mozilla pulls Battery Status API from Firefox over privacy concerns

firefox_magnifying_glass

It was supposed to be a feature that allowed more efficient versions of websites to be delivered to people running out of battery power.

But the Battery Status API built into Firefox was also found to be problematic from a privacy point of view after it was discovered that visitors' battery levels could be used to track them online. In response to this the API is being pulled from Firefox.

Continue reading

Microsoft: Russian hackers are exploiting Windows flaw exposed by Google

Microsoft

Microsoft says that a vulnerability in Windows made public by Google has been exploited by a hacking group with links to Russia. The group -- known variously as Strontium, Fancy Bear, and APT 28 -- has executed several spear phishing attacks, the company says.

Google was criticized for publicizing the vulnerability before Microsoft has released a patch. A fix for the security hole is not due to be released until Tuesday, 8 November -- voting day in the US election.

Continue reading

Samsung's Note7 exchange booths: Could users' old data be exposed?

ladyshock

When it comes to the exploding batteries on Galaxy Note7 models, Samsung has been lauded for its crisis management approach and how it’s accepted responsibility for the problem. Now setting up exchange booths at airports around the world so users can exchange their Galaxy Note7 phones is yet another example of its exceptional crisis management approach.

But while it’s commendable how swiftly Samsung is taking action to replace the faulty handsets, the company has left one crucial component out of this plan. That is, erasing the data from those Galaxy Note7 devices that are turned in at its exchange booths at airports around the world. There’s no mention of whether the data is being securely and permanently erased from the Galaxy Note7 phones that are taken back at the exchange booths -- and if it’s being done so before they’re handed off to Samsung’s chosen recyclers.

Continue reading

Microsoft Edge is way more secure than Chrome and Firefox

Edge

While Microsoft Edge might be a little lacking in features, compared to more established browsers like Chrome and Firefox, one area where it is better than its rivals is security.

That’s according to NSS Labs which today announced the results of its latest Web Browser Security comparative test. The test pitted Chrome, Firefox and -- for the first time -- Edge against each other to see how effective the browsers are at protecting against threats.

Continue reading

Google demos how neural networks can encrypt communications

data_encryption_tablet

In an effort to demonstrate how AI could be used to boost encryption, researchers at Google taught two neural networks how to communicate with one another while keeping their conversation secret from a third.

Researchers at the company's deep learning initiative, Google Brain, have successfully taught two neural networks, given the nicknames "Alice" and "Bob", to secretly communicate with one another while keeping the details of their conversations hidden from one called "Eve". Last week, the team behind this endeavor published a paper detailing the process of the experiment and its results.

Continue reading

AdWords malvertising targets macOS users

Attack key

Researchers at threat prevention company Cylance have discovered a malvertising campaign on Google AdWords for the search term "Google Chrome", where unsuspecting macOS users were being tricked into downloading a malicious installer.

The installer, identified as "OSX/InstallMiez" (or "OSX/InstallCore"), ultimately downloads a malicious file named "FLVPlayer.dmg". The malware hash changes on each download, making it difficult to detect and track.

Continue reading

British empire strikes back with new cyber security strategy backed by £1.9 billion investment

Great Britain UK keyboard laptop

The UK government has today launched a new National Cyber Security Strategy, setting out decisive action to protect the nation's economy and the privacy of British citizens, and strike back against attackers, while encouraging industry to up its game to prevent damaging cyber-attacks.

The strategy sets out how the UK will use automated defenses to safeguard citizens and businesses against growing cyber threats, support the UK's growing cyber security industry, develop a world-class cyber workforce, and deter cyber-attacks from criminals and hostile actors.

Continue reading

Load More Articles