Android Safe Mode Tips And Tricks

Android tips: How to use an important security feature you probably don’t know about

By on May 27, 2015 at 4:20 PM.

Android tips: How to use an important security feature you probably don’t know about

If your Android phone’s performance has gotten noticeably worse, it might be because it’s being plagued by a malicious app you’ve unwittingly installed. As GreenBot informs us, there’s actually a very good way to tell whether a third-party app is negatively affecting your phone’s performance by enabling a feature called Safe Mode. More →

No Comments
IRS Hack 100,000 Taxpayers' Data Stolen

Thieves hack IRS, steal tax info from more than 100,000 taxpayers

By on May 26, 2015 at 4:45 PM.

Thieves hack IRS, steal tax info from more than 100,000 taxpayers

Gulp. This isn’t good. The Associated Press reports that the Internal Revenue Service admitted on Tuesday that thieves had hacked into one of its systems and had managed to swipe tax information from more than 100,000 American taxpayers. According to the AP, the IRS says that the thieves “used an online service provided by the IRS to gain access to information from more than 100,000 taxpayers.” More →

No Comments
Google Security Questions

Google study finds website security questions are even less secure than passwords

By on May 22, 2015 at 6:20 PM.

Google study finds website security questions are even less secure than passwords

A new in-depth study from Google reveals that the security questions most individuals use as an additional layer of security are often less secure and easier to guess than user-chosen passwords. This is especially problematic given that security questions are often the only line of defense when a password is forgotten and needs to be resent or reset.

Interestingly enough, Google found that security questions tend to be weak because many individuals lie when answering them. Specifically, Google discovered that many people who provide fake answers to security questions do so to make them harder to guess. But as it turns out, “on aggregate this behavior had the opposite effect as people harden their answers in a predictable way.” Compounding the problem is that many users, as a result, also have a difficult time remembering their security question answers in the first place. This is especially true when the questions chosen are exceedingly specific.

More →

No Comments
Android Factory Reset

500 million Android devices at risk: Researchers find that factory reset doesn’t completely wipe data

By on May 22, 2015 at 3:02 PM.

500 million Android devices at risk: Researchers find that factory reset doesn’t completely wipe data

One of the most important things to do before selling or giving away a used smartphone is to wipe the device clean. After all, the last thing anyone wants is for a complete stranger to have access to all of their personal data. Unfortunately for Android users, researchers from Cambridge University recently discovered that performing a data wipe on Android devices doesn’t clear the device as one would expect.

More →

No Comments
Adult FriendFinder Dating Profile Hack Leak

Do this now: Secure your adult dating profiles – a major site was just hacked

By on May 22, 2015 at 7:00 AM.

Do this now: Secure your adult dating profiles – a major site was just hacked

In case you happen to have one or multiple adult dating website profiles, you might consider securing them right away, as one of the world’s largest such websites has been hit by hackers. The attackers managed to steal highly sensitive personal data for four million users, leaking them online in spreadsheet format. More →

No Comments
NSA Android App Store Hack

The NSA came up with a brilliantly sneaky way to hack your Android phone

By on May 21, 2015 at 10:30 PM.

The NSA came up with a brilliantly sneaky way to hack your Android phone

Once again, we have to tip our cap in grudging admiration for the lengths the National Security Administration will go to hack into our mobile devices. The Intercept has published some new documents leaked by Edward Snowden that show how the NSA and other spy agencies at one point planned to conduct man-in-the-middle attacks between end users and Android app stores to infect users’ phones with spyware. More →

No Comments
Apple Watch Security Flaw

Potentially big Apple Watch vulnerability could let thieves use Apple Pay on stolen watches

Potentially big Apple Watch vulnerability could let thieves use Apple Pay on stolen watches

By on May 20, 2015 at 10:20 AM.

A potential security vulnerability recently detailed by a blogger may have uncovered a serious flaw in the Apple Watch’s design that could lead to some big headaches for some users. In a nutshell, a nifty feature designed by Apple to maintain security on the Watch without sacrificing convenience may have actually ended up sacrificing security instead, allowing thieves to continue using Apple Pay on a stolen Watch without having to input the owner’s PIN code to confirm purchases.

It should be noted, however, that the procedure detailed by the blogger in question did not yield consistent results. As such, a thief would seemingly need a bit of luck in order to ensure that he or she can exploit this vulnerability. More →

No Comments
Keylogger For PC

$10 gadget that looks like a harmless phone charger lets you spy on your coworkers

By on May 18, 2015 at 11:54 AM.

$10 gadget that looks like a harmless phone charger lets you spy on your coworkers

The number of tools that nefarious hackers have at their disposal these days is positively frightening. Attacks seem to be growing more complex and more dangerous by the day, and we constantly see new stories emerge that cause us to rethink our own security practices. But as we are reminded constantly, it doesn’t always take complex machinery or even any real coding know-how to steal things using technology — in fact, people were recently caught using an iPod nano and a piece of plastic to steal cash from ATMs.

Now, it looks like anyone can spy on others in the vicinity with a new gadget that is cheap, relatively easy to build, and looks just like a normal cell phone charger. More →

No Comments
How To Rob An ATM iPod Nano

How to steal cash from an ATM using just an iPod nano and a piece of plastic

By on May 14, 2015 at 6:20 PM.

How to steal cash from an ATM using just an iPod nano and a piece of plastic

There’s a new and depressingly simple way to steal cash from ATMs and rob other people’s bank accounts, Business Insider informs us. Apparently, thieves have started rigging ATMs to grab people’s ATM cards while at the same time hooking up a concealed fifth-generation iPod nano near the machine to record a video of the users entering in their PINs. Once the users walk away because they figure the machines have simply eaten their cards, the thieves walk in, dislodge their card from the machine and then use their PIN to rob them blind. More →

No Comments
Verizon Security Vulnerability

Massive Verizon security hole made accessing private customer information a breeze

By on May 13, 2015 at 5:10 PM.

Massive Verizon security hole made accessing private customer information a breeze

Verizon made headlines this week with the surprise $4.4 billion acquisition of AOL, but a new report from BuzzFeed reveals that a major security flaw could have made this a much more challenging week for the telecommunications giant.

More →

No Comments
Breaking Bad Malware

‘Breaking Bad’ themed malware has been discovered

By on May 11, 2015 at 6:45 PM.

‘Breaking Bad’ themed malware has been discovered

Security researchers at Symantec recently discovered a new piece of malware that, believe it or not, incorporates a number of themes from the hit TV show Breaking Bad. The malware itself primarily affects users in Australia and represents a new strain of an existing ransomware trojan dubbed Trojan.Cryptolocker.S.

The ransomware, which only targets Windows machines, operates by encrypting all of a user’s files and subsequently demanding a timely payment of $450 Australian Dollars (about $355 in U.S. dollars) to decrypt them. Failure to promptly make the $450 payment results in the decryption fee rising to $1000 Australian Dollars.

More →

No Comments
Android Apps Malware Tracking Sites

Study finds many Android apps connect to a frightening number of shady tracking sites

By on May 4, 2015 at 12:25 PM.

Study finds many Android apps connect to a frightening number of shady tracking sites

By now we’re all familiar with the upsides and downsides to the Google Play store’s approach to vetting apps: The upside is that it’s incredibly easy for new apps to get posted on the store. The downside is that it’s incredibly easy for shady mobile apps to get posted on the store. Technology Review points us to a new study from the Institut Eurécom that shows us how shady Android apps might be even shadier than we ever imagined. More →

No Comments