Lesson in password security: Photo of UK’s Prince William reveals password for Royal Air Force login
You know the Duke of Cambridge, popularly known as Prince William? Yeah, well, the English monarchy likes to release photos of their royals for public relation purposes. Last week Prince William’s official website released some photos of ole William and his role as a Royal Air Force (RAF) search and [...]Read More »
French magazine L’Express is reporting that, last May, the computers in the offices of Nicolas Sarkozy (who was still president back then) were hacked by the “Flame” malware. This is that same malware that made headlines for being developed by the United States and Israel for intelligence and disruption purposes [...]Read More »
Would you want Apple apps like iPhoto, iMovie, Garage Band and iWork suite on your Android advice? I know I wouldn’t mind would probably even pay for apps, assuming they are quality.
One malicious “developer” clearly thinks the same and decided to take advantage of the unsuspecting by releasing fake [...]Read More »
Some companies, and individuals, find and disclose vulnerabilities — may those be on websites, operating systems, programs, whatever — for the betterment of society. Others do it for a “finder’s fee”. VUPEN does it so they can sell the secrets to whomever wants them.
VUPEN is a security research firm [...]Read More »
Ransomware is a special type of malware that locks, or claims to lock, your files and folders; then it asks you to pay a certain amount of money before you are given access back to your data. If you don’t pay, you don’t get access to your data (unless you [...]Read More »
Do you ever feel sorry for Adobe? I mean, yeah, it is hard to feel sorry for a multi-billion dollar corporation that likes to use closed standards and charge us for the privilege. But still, you have to feel for them; two of their products, Flash and Reader, are two [...]Read More »
Firefox is going to start forcing HTTPS usage for sensitive websites, to thwart man-in-the-middle attacks
After reading the title of this article, you must be thinking “sounds like what HTTPS Everywhere does”. No, not exactly.
You see there are some websites out there that use HTTP Strict Transport Security (HSTS), a protocol that forces browsers to default to HTTPS when connecting to the website in [...]Read More »
Java, Flash, and iTunes are in the “top 10 vulnerabilities” list — Microsoft products are nowhere to be found
Kaspersky Labs, a digital security firm, releases a quarterly “IT Threat Evolution” report. For the Q3 2012 report, one section provides information as to what programs have the most widely spread vulnerabilities. I’m sure you can guess some but may be surprised by others.
The following are the top ten [...]Read More »
Fake e-mail from “Microsoft Windows 8 Team” claims to give you free Windows 8 but is actually a phishing attack
We have seen many e-mail scams, ranging from e-mails that try to steal your information to e-mails that try to infect your computer with malware. In particular one fake e-mail was particularly clever because it used the cover of a real Microsoft e-mail to infect your computer. Now there is [...]Read More »
Ever wonder what are the passwords people use the most? SplashData, a software company that makes password management programs and apps, has compiled its annual “Worst Passwords” list for 2012, which gives us some insights on what the most popular bad passwords used by people. The top three most used [...]Read More »
It seems like with the increasing level of access to technology on a global scale, there are increasing numbers of scam artists, hackers, pricks, punks, assholes, scumbags, etc. that try to find ways to make everyone’s digital life a bigger pain than it needs to be. There are [...]Read More »
Millions of Android users can have their passwords, e-mails, and other data stolen due to poorly coded apps
Have you never done any banking on your smartphone because you had security concerns? Then you, my friend, might have made the right decision. A new study conducted by researchers from two German universities reveals that millions of Android users are vulnerable to data theft due to many apps being [...]Read More »
Curious as to who you can thank for those glorious spam emails you receive? India, Italy, and United States, the top three countries when it comes to number of spam sent from July 2012 to September 2012.
According to the “Dirty Dozen” report by SophosLabs, a UK-based digital security firm, [...]Read More »
These are seven new malicious emails you should stay clear of — emails from YouTube, Google, Facebook, LinkedIn, British Airways, and DHL Express
dotTech has gotten into the habit of warning our readers about web security issues, namely malicious emails that make their rounds in the inboxes of people around the world — such as the fake Windows Update password stealing email and the fake email from Microsoft. The following are seven new [...]Read More »
[Windows] Comodo Cleaning Essentials is a portable tool that helps find, stop, and remove malware/viruses
There are tons of different virus and malware removal tools out there. However, the problem is most of these programs have to be installed to do their job. What if you get hit by a virus that prevents you from installing new software and you have nothing to remove it? [...]Read More »
Despite using some of the most popular and expensive anti-virus programs, some users are still infected with stubborn malware. If your other anti-malware programs are of no help, Symantec’s new tool Norton Power Eraser could be the answer to remove such stubborn bugs.[...]
WHAT IS IT AND WHAT DOESRead More »
Due to their frequent giveaways last year, most of us probably have heard of — if not used — Zemana AntiLogger, a security solution that costs $29.95 per year. However, I’m sure most dotTechies have not yet heard of Zemana AntiLogger Free, the freeware version of Zemana AntiLogger.[...]
WhatRead More »
Reports are emerging of an extension by the name of “Settings Protector” is installing itself in Google Chrome for some users. It isn’t entirely clear where this extension comes from, how it is being installed, what it does, or if it is Windows-only or affects other platforms too. However, because [...]Read More »
Malware is being spread with “lol is this your new profile pic” message on Skype — be careful what you click
Skype users be warned: if you get a message on Skype that says “lol is this your new profile pic” with an accompanying http://goo.gl/XXX?img=XXX URL, do not click on the link!
It is being reported by various security firms, and confirmed by Skype, that many Skype users are being spammed [...]Read More »
Update: Firefox 16.0.1 is out now. See this article for more information.
As I was trolling the web to find interesting tidbits to share with dotTechies, I learned that Firefox 16 has been released. I set the story aside for publication later in the day. Once later in the day [...]Read More »
Windows XP is the most exploited version of Windows while infections on Windows 7 are increasing, according to Microsoft
Wondering which version of Windows you should stick to be the safest? According to data released by Microsoft in its most recent Microsoft Security Intelligence Report, Windows XP remains at the top of the list when it comes to most infected Windows version while Windows 7 — particularly 64-bit [...]Read More »
New malware (ransomware) locks your computer claiming you violated the law under SOPA, asks for $200 if you want your files back
Ransomware is a type of malware that locks your computers, encrypts your files, etc. to prevent you from accessing your data and asks for money if you want to regain access. In other words, your data is held ransom, hence the name ransomware.
A new ransomware is floating around the [...]Read More »
Yesterday we learned Innovative Marketing, a firm that developed scareware programs, has to pay a fine of $163 million. In the comments of the article, Rob mentioned another scareware scam — “tech support” calling up people, telling them there are issues with their computers, and charging them for the privilege [...]Read More »
In this day and age, most semi-tech savvy computer users know what scareware is. For those that don’t, scareware is not malware, per se, but it is software that make you think like you have a problem on your computer (when you actually don’t) and charge you a large sum [...]Read More »
PlaceRaider. The name sounds like a gamer tag someone would use on Xbox. It isn’t a gamer tag, however. (Well it might be but not in the context of this article.) PlaceRaider is the name of a new malware developed by Robert Templeman from the US Naval Surface Warfare Center [...]Read More »
Be careful what you rent — rent-to-own computers from seven companies spied on users, stealing passwords and photographing… sex
You know those scary stories you hear about how a hacker took control of someone’s webcam and videotaped or photographed them without their knowledge? Yeah, well, it turns out hackers aren’t the only ones doing such things — companies that rent out computers do such things, too.
The Federal Trade [...]Read More »
New Java vulnerability in Java 5/6/7 bypasses Java security sandbox, affects 1 billion users worldwide
Is it open season on Java? Or has the season for Java never ended? Who knows. I do know, however, that yet another vulnerability has been discovered in Java. This time the vulnerability affects Java 5, Java 6, and Java 7, meaning roughly one billion users around the world are [...]Read More »
IEEE, a group of tech experts, leaks almost 100,000 usernames and passwords — login information for Google, Apple, and Samsung employees
The Institute of Electrical and Electronics Engineers (aka IEEE) describes itself as “the world’s largest professional association for the advancement of technology”. The IEEE is not only home to many big names in the scientific and engineering community but many IEEE members are also employees of big tech firms (Google, [...]Read More »
Fake “Microsoft Windows Update” e-mail will steal your Gmail, Windows Live, Yahoo, or AOL passwords — be careful
E-mail threats are a non-stop nuisance. After the recent “Important Changes to Microsoft Services Agreement” malicious e-mail, we have another swipe at Windows users. This time the e-mail comes in the form of a phishing attack.
An e-mail from “email@example.com” with the subject of “Microsoft Windows Update” is hitting inboxes [...]Read More »
For years, Microsoft has been secretly limiting online passwords to 16 characters — despite leading users to believe otherwise
When you register for a new Outlook.com e-mail address, you are told your password can be a maximum of sixteen characters. While there are, of course, security implications with limiting passwords to sixteen characters, what is worse is how Microsoft has been lying to us for years.
You see while [...]Read More »
Microsoft releases new update to plug Internet Explorer exploit — get this now even if you got the earlier one (both 32-bit and 64-bit are supported)
Earlier this week dotTech brought you news about a vulnerability affecting Internet Explorer. Microsoft realized the significance of the vulnerability and quickly issued a hack-and-slash Fix it utility to patch the vulnerability. Aside from the fact that the earlier Fix it apparently didn’t support 64-bit machines, it also wasn’t a [...]Read More »
You know that Internet Explorer vulnerability affecting Internet Explorer 7/8/9 on Windows XP/Vista/Win7 dotTech recently posted about? Yeah, well, it looks like Microsoft is on the ball with this one; they have just issued an easy-to-apply ‘Fix it’ to patch the vulnerability. According to Microsoft, “applying the Fix it solution, [...]Read More »
How willing are you to change your password? 38% of people would rather clean a toilet, according to a study
I’ll be the first to admit that, despite knowing better, I hate changing my password. In fact, even when I am forced to change my password, such as when some systems and websites force users to change their password after a certain amount of time has passed, I always try [...]Read More »
Whether it be through Windows or its online services, Microsoft touches the lives of many, many people around the world on a daily basis. So when an e-mail from “Microsoft <firstname.lastname@example.org>” with the subject of “Important Changes to Microsoft Services Agreement” magically appears in the inbox [...]Read More »
Last week researchers unveiled a new exploit that allows the hijacking of HTTPS connections, the type of connections the world relies on for secure data transfer over the Internet.
Dubbed CRIME (Compression Ratio Info-leak Made Easy), the hack exploits vulnerabilities in Secure Sockets Layer (SSL) and Transport Layer Security (TLS) [...]Read More »