Tag Archives: security

Chrome 71 will block any and all ads on sites with “abusive experiences”

By Peter Bright

Chrome 71 will block any and all ads on sites with “abusive experiences”

Enlarge (credit: Isaac Bowen / Flickr)

Google is promising to punish sites that offer what the company calls “abusive experiences.” Chrome 71, due for release in December, will blacklist sites that are repeat offenders and suppress all advertising on those sites.

The behaviors deemed abusive cover a range of user-hostile things, such as ads that masquerade as system error messages, ads with fake close boxes that actually activate an ad when clicked, phishing, and malware. In general, if an ad is particularly misleading, destructive, or intrusive, it runs the risk of being deemed abusive.

Chrome already takes some actions against certain undesirable website behaviors; it tries to block popups, it limits autoplay of video, and it blocks certain kinds of redirection. These measures have been insufficient to prevent misleading or dangerous ads, hence Google taking further steps to banish them from the Web.

Read 2 remaining paragraphs | Comments

Source:: Ars Technica Gadgets


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys

By Dan Goodin

Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys

Enlarge (credit: Intel)

Over the past 11 months, the processors running our computers, and in some cases phones, have succumbed to a host of attacks. Bearing names such as Meltdown and Spectre, BranchScope, TLBleed, and Foreshadow, the exploits threaten to siphon some of our most sensitive secrets—say passwords or cryptographic keys—out of the silicon microarchitecture in ways that can’t be detected or stopped by traditional security defenses. On Friday, researchers disclosed yet another leak that has already been shown to exist on a wide range of Intel chips and may also affect other makers, too.

PortSmash, as the new attack is being called, exploits a largely overlooked side-channel in Intel’s hyperthreading technology. A proprietary implementation of simultaneous multithreading, hyperthreading reduces the amount of time needed to carry out parallel computing tasks, in which large numbers of calculations or executions are carried out simultaneously. The performance boost is the result of two logical processor cores sharing the hardware of a single physical processor. The added logical cores make it easier to divide large tasks into smaller ones that can be completed more quickly.

Port contention as a side channel

In a paper scheduled for release soon, researchers document how they were able to exploit the newly discovered leak to recover an elliptic curve private key from a server running an OpenSSL-powered TLS server. The attack, which was carried out on servers running Intel Skylake and Kaby Lake chips and Ubuntu, worked by sending one logical core a steady stream of instructions and carefully measuring the time it took for them to get executed.

Read 17 remaining paragraphs | Comments

Source:: Ars Tecnica


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Tonight’s Video Worth Sharing: Easy Free Password Tips And Tricks!

By Tim

Late last evening I decided to do this video to show folks an easy way to generate some complex passwords and how to remember them.

There are no startling revelations here, just a quick fast method to generate passwords of any length and as many or few passwords as you deem necessary.

If you can click and copy and paste, then you can do this! It is exceedingly simple and you can put your own twist on this method. I use this to change my WiFi hotspot password on my phone in just a few seconds.

You might want to take note of this website.

So let us proceed at once to the video and for new visitors there, you could try giving us a like or subscribing to our channel.

That is all for now, except please subscribe to our channel or click those big donation buttons on the website here!

Tim

————————————————————————————–
This site formerly ran on either a Chuwi HiBook tablet or occasionally my Chuwi Hi12 tablet. Check the About page for details. Don’t miss our new YouTube Channel!

Shop our Sponsor

Shop our Sponsor

Source:: THE Tablet Test Server


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Tonight’s Video Worth Sharing: BLU Studio Energy 2 Did Have a Virus!

By Tim

A few days back I mentioned restoring the BLU Studio Energy 2 phone back to factory defaults and yes it was a long arduous process. Today however I may have discovered why.

Yeah, it looks like there was a virus on it and that virus has now been cleaned/destroyed/defeated! Well, at least for now!

So there isn’t a lot I need to explain that you can’t find out from watching the video below. Perhaps you might even learn something!

That is all for now, except please subscribe to our channel or click those big donation buttons on the website here!

Tim

————————————————————————————–
This site formerly ran on either a Chuwi HiBook tablet or occasionally my Chuwi Hi12 tablet. Check the About page for details. Don’t miss our new YouTube Channel!


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Widely used D-Link modem/router under mass attack by potent IoT botnet

By Dan Goodin

Enlarge (credit: D-Link)

Malicious hackers are mass exploiting a critical vulnerability in D-Link DSL routers in an attempt to make them part of Satori, the potent Internet-of-things botnet that’s used to take down websites and mine digital coins, researchers said.

Since making its debut late last year, Satori has proven to be a particularly versatile and sophisticated botnet. It made a name for itself in December when it infected more than 100,000 Internet-connected devices in just 12 hours by exploiting remote code-execution vulnerabilities in Huawei and RealTek routers. A month later, Satori operators released a new version that infected devices used to mine digital coins, proving that the IoT botnet could also take control of more traditional computing devices. In February, Satori resurfaced when it infected tens of thousands of routers manufactured by Dasan Networks.

Building a better mousetrap

A key to Satori’s success is its use of the publicly released Mirai IoT botnet source code to turn devices with easily guessable passwords into platforms for launching Internet-crippling attacks. In 2016, Mirai launched a series of record-setting denial-of-service attacks that took security site KrebsonSecurity offline and also targeted online gamers. Satori operators use the Mirai code as a foundation on which they’ve erected an evolving series of new exploits that allow the botnet to control devices even when they’re secured with strong passwords.

Read 6 remaining paragraphs | Comments

Source:: Ars Tecnica


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!