Alexa and Google Home phishing apps demonstrated by researchers

Credit to Author: Lisa Vaas| Date: Wed, 23 Oct 2019 12:43:57 +0000

The researchers’ “Smart Spies” apps showed how Amazon Alexa and Google Home users could be exposed to vishing and eavesdropping.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/2-76soYbixo” height=”1″ width=”1″ alt=””/>

Read more

Woman ordered to type in iPhone passcode so police can search device

Credit to Author: Lisa Vaas| Date: Tue, 22 Oct 2019 11:41:03 +0000

It’s not a violation of her Fifth Amendment rights, the court said, because it’s a “foregone conclusion” that she knows her phone passcode.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/DdWnZ_mEEBY” height=”1″ width=”1″ alt=””/>

Read more

A week in security (October 14 – 20)

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Oct 2019 15:45:45 +0000

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Categories:

Tags:

(Read more…)

The post A week in security (October 14 – 20) appeared first on Malwarebytes Labs.

Read more

But I’m still me

Credit to Author: Sharky| Date: Mon, 21 Oct 2019 03:00:00 -0700

Longtime user at a big bank can’t access the archiving system, the intranet kicks her back to the login screen, and the attendance system that pilot fish supports never heard of her. She’s frantic to be recognized by the system, and she starts flooding the IT department with calls — not just the help desk, but operations and individual IT employees as well.

Everyone who gets a call is solicitous and sympathetic, and they all run down the list of questions that could rule out scenarios. Did she get a new PC? No. Did she change offices? No. Is anyone else affected? No. So what is going on?

The answer is simple after all. The woman had just gotten married, and upon her return from her honeymoon, she started using her new last name with every application — without first requesting to have her name changed in any applications. What isn’t so simple is understanding why she never thought to try logging in with her maiden name.

To read this article in full, please click here

Read more

When can we get rid of passwords for good?

Credit to Author: Pieter Arntz| Date: Wed, 16 Oct 2019 20:17:19 +0000

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Categories:

Tags:

(Read more…)

The post When can we get rid of passwords for good? appeared first on Malwarebytes Labs.

Read more

218 million Words With Friends players lose data to hackers

Credit to Author: Lisa Vaas| Date: Wed, 02 Oct 2019 12:20:10 +0000

The serial hacker GnosticPlayers is claiming to have ransacked Zynga’s user data – including names, emails and passwords.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/5iXJ4_o_gJ4″ height=”1″ width=”1″ alt=””/>

Read more

Court squeezes $1 million back from convicted phisher

Credit to Author: Lisa Vaas| Date: Tue, 27 Aug 2019 09:56:31 +0000

Prolific phishing scammer Grant West has been sentenced to 10 years, 8 months, and reimbursement for victims.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/sHYkSkwLCAs” height=”1″ width=”1″ alt=””/>

Read more

Massive MoviePass database found exposed on public server

Credit to Author: Lisa Vaas| Date: Thu, 22 Aug 2019 10:53:50 +0000

Tens of thousands of records with financial data were left in plaintext in a database that wasn’t protected with a password.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/I_WpJujTJuc” height=”1″ width=”1″ alt=””/>

Read more