Notebookcheck

Cyberlaw

     restrict settings
additional restrictions: Cyberlaw
Image source: Microsoft

Windows 10 S can be infected with malware

While Microsoft has claimed that Windows 10 S is not vulnerable to any currently known malware, a clever cybersecurity professional has found an exploit in Microsoft Word that can run malicious code in the operating system.
Google looks to take a harder stance against policy violators and online terrorists. (Source: Google)

Google takes a hard line on online terror in its new 4-step plan

In a recent blog post, General Counsel at Google Ken Walker delineated the company's mission to combat terrorism online. While Google already devotes a portion of its enormous resources toward counter-terrorism, the company aims to bolster its efforts with a newly published 4-step plan.
WannaCry is estimated to have extracted US$126,000 in Bitcoin from victims. (Source: Gillian Hann/Twitter)

British intelligence claims North Korea is behind WannaCry, though doubts persist

US and British intelligence services believe that they tracked the WannaCry ransomware to North Korea via attributing it to the Lazarus Group, who hacked Sony Pictures in 2014 preceding the release of the comedy film "The Interview".
Maybe we can trade Ajit Pai for Canada's Jean-Pierre Blais? Just a thought... (Source: Huffington Post)

Canada will soon require all smartphones to be sold unlocked

In the US, carriers have to unlock your phone once you've paid it off. But a recent Canadian ruling goes one step further: upon request, your device must be unlocked, for free, regardless of contract state. Furthermore, all new phones must be sold unlocked starting in December.
Google Drive becomes Google Backup and Sync and will release on June 28th. (Source: Google)

Google Drive will become Google Backup and Sync, will be able to back up more files

Google Drive will soon become Google Backup and Sync, which will start backing up your selected files not just from your Google Drive folder, but from almost anywhere on your computer.
Most apps send out some level of personal data to third parties. (Source: TechRadar)

Study reveals 70 percent of mobile app data is being shared with third parties

A recent study by a Spanish institute has just revealed that the majority of mobile apps used share data with third parties.
Apple is on-track to open 40 Apple retail stores in China by this October. (Source: TechCrunch)

Chinese officials uncover massive data theft by local Apple employees

An underground identity-theft ring where Apple employees were selling customers' personal data was uncovered in China.
Source: Android Police

Andy Rubin's Essential brand accused of trademark infringement

Spigen, a smartphone manufacturer that owns trademark rights to the term "Essential," has sent a Cease and Desist order to Andy Rubin's Essential company. Claiming that Essential infringed on their copyright, Spigen demanded that Essential stop using the trademark.
The Malware, developed by a Chinese digital marketing company, hijacks the victim's browser and can then steal their private information or install additional malware. (Source: Check Point Threat Intelligence)

Chinese "Fireball" malware infects almost 250 million computers

Chinese company Rafotech has been found to be responsible for the current epidemic of the "Fireball" malware, which has affected nearly 250 million computers worldwide. Fireball is usually installed by piggybacking on an installer of wanted software; it then hijacks the user's browser and can then proceed to do anything from spying to dropping additional mal...
...
Lithium battery catches fire aboard flight to San Francisco (Source: CNN)

Lithium-ion battery catches fire aboard flight to San Francisco

A single faulty AA battery belonging to a passenger was responsible for an emergency landing two hours into the cross-country flight.
A recently confirmed Android exploit can seize control of your device. (Image source: goh4x.blogspot.com)

"Cloak and Dagger" vulnerability can leave your Android phone open to attack

The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
The unassuming intrusion method has made this attack one of the most widespread in recent history. (Source: Check Point)

Vulnerability found in subtitle system of VLC, Kodi, and other media players

By injection malicious code into subtitle files, hackers are able to take full control of a device that loads the malicious subtitles. The exploit affects four of the biggest media streaming services: VLC, Kodi, Popcorn Time, and Strem.io.
Say goodbye to Messenger "Days", games, and poor performance by using Messenger Lite. (Source: Facebook)

If you're tired of Facebook Messenger's bloat, try Messenger Lite

Facebook's ubiquitous chatting app, Messenger, has become so bloated that Facebook has already spun off a version for developing markets called "Messenger Lite". To install it in most countries, however, you'll have to sideload it on your Android phone.
One metric for assessing the validity of a threat is its specificity. (Source: The Guardian)

Leaked internal Facebook censorship guidelines fuels concern about ethics

Internal documents from Facebook revealed to the Guardian show the difficulties the company is facing to police its 2-billion-strong membership.
US may extend laptop ban to incoming flights from Europe (Image: regmedia.co.uk)

US may extend laptop ban to more incoming flights from Europe

Flying to the United States from Europe? You may soon be forced to check in your laptop and tablet for safety.
Game console emulators like Nesbox will no longer be available on the Windows Store. (Source: Nesbox)

The Windows Store has officially banned emulators

Microsoft's latest policy change for the official Windows Store bans emulators outright. However, the software can still be found and downloaded online.
The personal data of 100,000 taxpayers has been compromised through an exploit of the FAFSA program. (Source: IRS)

Hackers compromise U.S. taxpayer data through university financial aid system

Using an exploit in the Free Application for Federal Student Aid and tools used to retrieve tax data, hackers were able to breach part of the IRS database and steal personal data for 100,000 U.S. taxpayers.
The U.S. House of Representatives has signed the action to repeal FCC regulations concerning user privacy.

United States House of Representatives votes to allows ISPs to sell browsing history

Both the House and Senate have now voted to allow ISPs to sell the personal data of their customers. The measure will go before President Trump, who is expected to sign the bill into action.
Arizona Senator Jeff Flake introduced the repeal of the FCC regulations. (Source: Washington Times)

ISPs can sell your browsing history without your consent, Senate rules

FCC regulations that would disallow ISPs to share or sell users' internet browsing history and other private information without their explicit consent have been shot down in the US Senate.
Most Android phones in the US are running old security software. (Source: Skycure)

Most Android devices are running old security patches and could be vulnerable

A whopping 71% of Android devices in the United States run security patches that are 2 months old or older. This could leave them vulnerable to exploits made known in the latest security update logs.
Wikileaks says the CIA specifically targeted Apple products

Wikileaks says the CIA specifically targeted Apple products

The notorious activist group says that the CIA developed specialized tools to specifically target and infiltrate Apple products, namely Macbooks and iPhones. The tools have been in use since at least 2008.
T-Mobile's Scam ID service will identify possible scam phone calls. (Source: T-Mobile)

T-Mobile fights scammers with call warnings

Two new programs, Scam ID and Scam Block, will help T-Mobile customers avoid scam phone calls by identifying known scam numbers and warning users. Clients can also opt in to Scam Block, which outright blocks known scammers.
Google has admitted that less than half of the active Android devices in 2016 received security updates. (Source: Phone Arena)

Google promises better security for Android in 2017

Google has promised to provide more frequent and timely security updates for Android in 2017 due to the increasing number of Android-powered devices and the corresponding threat from malware.
As of March 2017, about 97.2% of Android devices may be vulnerable to exploits in WikiLeaks' latest documents. (Picture source: Android Developers)

Google says it has patched exploits used by the CIA

Google is confident that the latest versions of Android and Chrome are not vulnerable to the hacking tools detailed in the latest Wikileaks dump. Older versions of the software, however, may still be vulnerable.
The "Weeping Angel" exploit tricks users into thinking the TV is powered off while it is actually on and recording. (Source: Samsung)

Wikileaks reveals trove of CIA hacking tools for iOS and Android-driven devices

WikiLeaks has released a trove of information revealing the range of the CIA's hacking exploits and cyber-ordinance, including malware to use Samsung smart TV's for surveillance.
"Smart" devices are smart because they collect and learn from data they collect from their users. (Source: The Motley Fool)

Consumers are still (rightfully) wary of smart home devices

A new research report released by Gartner has revealed consumers to be wary of the risks of IoT devices while skeptical of their benefits.

Working For Notebookcheck

Are you a loyal reader of notebookcheck? Are you a techie who knows how to write? Then join our Team!

Especially wanted: 
Review Editor - 
Details here
News Editor - Details here

 

 

 

 

Tags

Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > Topics
Redaktion, 2013-05- 8 (Update: 2013-09-27)