Printers are not simply "dumb" devices designed to squirt ink or deposit toner — most run rudimentary operating systems and some are capable of printing and scanning without a PC attached. While this is great for productivity, it also offers hackers with a new attack vector — one HP had to recently deal with.
Tagged With security
How does that Dark Knight Rises quote go again? "You either die a hero, or live long enough to see yourself become the villain"? Turns out, this applies to software as much as it does to superheroes. CCleaner, once the premiere tool against crap-installing programs, is becoming the very thing it was designed to fight.
Amid mounting pressure from privacy activists and a public concerned by how their medical data will be used, Health Minister Greg Hunt has announced a number of changes to be made to the My Health Record rollout, from what happens when you cancel a record to restrictions around who can access the data.
Symantec has announced the opening of its largest security operations centre (SOC) in Chennai. The new facility accomodates over 140 staff with room for another hundred as the company escalates its efforts against cybercrime in order to protect all their customers, from the largest corporates to individuals at home. What is it that makes a SOC important?
There's a scene in The Matrix when Morpheus explains to Neo that the Matrix is a world governed by rules and that those rules can be manipulated or broken. In effect, what Morpheus was advocating was finding ways to carry out an action that the software didn't anticipate in order to generate an unexpected outcome. That's what anti-AI is about.
Google says that they have not had a single successful phishing attack for about 18 months following the introduction of physical security keys. These are used in place of passwords and one-time codes, such as those created by tools such as Google Authenticator, which Google's workforce of more than 85,000 staff were required to use before. Here's what Google has done.
Though more router manufacturers are making routers easier to set up and configure — even via handy little apps instead of annoying web-based interfaces — most people probably don't tweak many options after purchasing a new router. They log in, change the name and passwords for their Wi-Fi networks and call it a day.
July 16 marks the start of the three-month period in which Australians can opt-out of the government's My Health Record. Planned as an "online summary of your health information" that "can be accessed at any time by you and your healthcare providers", there are no guarantees about how your data will be used by said providers. Here's what you need to know about MHR and how to opt-out if privacy is your main concern.
USB Restricted Mode has been added and removed from several beta versions of iOS 11 but Apple has finally decided the security feature is ready for the mainstream. What is USB Restricted Mode and will it make any difference to the already tense relationship between Apple and the law enforcement community?
We've all seen those quizzes on Facebook that answer such important questions as "What tattoo should you get?" and "Who were you in a past life?". While they may look harmless it turns out one of the creators of those surveys has been leaking personal data for the last two years. Just to add salt to the wound, Facebook didn't check the app properly.
Firefox says they are testing a new feature that will allow you to easily check if your email address has been involved in a data breach and provide recommendations on what to do to protect your personal data. The new feature, which has a strong Australian connection, will initially be deployed to 250,000 users, most of whom will be from the United States, before becoming widely available.
iOS, Android: Keepsafe, the company behind privacy-focused apps like Blur for iMessage and Private Photo Vault, launched a new app this week for browsing the web privately. Aptly named Keepsafe Browser, the browser prevents third-party trackers from snooping on your mobile web browsing and comes with a built-in ad blocker to give you a little more privacy as you peruse the web.
You know the drill. If you enter your iPhone passcode incorrectly ten times the phone is locked. Each time you get it wrong, you have to wait a little longer before trying again. A security researcher claims that by sending those passcode requests really fast, you can brute force a passcode before Apple's software has a chance to invoke the delay system.
Programmer Brannon Dorsey wrote up a fascinating and fairly technical piece about the perils of DNS rebinding the other day. It's worth a read if you have even the slightest interest in how web browsers work to prevent one site — a scammy site, let's say — from sending a request to another site — your bank — and draining your accounts or manipulating your credentials (without the site's explicit permission).
Almost every service you use on the web that involves a username and password is in some ways collecting information about you. In some cases, that info might just be your email and a few identifying data points like your age or gender. In others, (*cough* Facebook) you're handing over information about your likes and dislikes, who your friends are, and even where you go during the day.
You might know what a virtual private network (VPN) is, but the odds of you actually using one are low. You really should be using a VPN -- ultimately, you may end up seeing it as just as vital as your internet connection. We'll tell you why, explain how to choose a VPN provider and list five that are worth considering.
We often forget that routers are very complex machines that run software designed to manage a massive array of functions - software that can carry vulnerabilities. Throw in the fact many people don't know how to secure their network or router and you have a ticking time-bomb that bad guys are waiting to detonate. What can you do defuse this potentially explosive situation?