Posts By :

Ravensdale Digital

Google Chrome Will Automatically Scan Your Passwords Against Data Breaches Ravensdale Digital

Google Chrome Will Automatically Scan Your Passwords Against Data Breaches

A data breach on a site or app exposed your password. Chrome recommends checking your saved passwords now.

Google’s password checking feature has slowly been spreading across the Google ecosystem this past year. It started as the “Password Checkup” extension for desktop versions of Chrome, which would audit individual passwords when you entered them, and several months later it was integrated into every Google account as an on-demand audit you can run on all your saved passwords. Now, instead of a Chrome extension, Password Checkup is being integrated into the desktop and mobile versions of Chrome 79.

All of these Password Checkup features work for people who have their username and password combos saved in Chrome and have them synced to Google’s servers. Google figures that since it has a big (encrypted) database of all your passwords, it might as well compare them against a 4-billion-strong public list of compromised usernames and passwords that have been exposed in innumerable security breaches over the years. Any time Google hits a match, it notifies you that a specific set of credentials is public and unsafe and that you should probably change the password.

The whole point of this is security, so Google is doing all of this by comparing your encrypted credentials with an encrypted list of compromised credentials. Chrome first sends an encrypted, 3-byte hash of your username to Google, where it is compared to Google’s list of compromised usernames. If there’s a match, your local computer is sent a database of every potentially matching username and password in the bad credentials list, encrypted with a key from Google. You then get a copy of your passwords encrypted with two keys—one is your usual private key, and the other is the same key used for Google’s bad credentials list. On your local computer, Password Checkup removes the only key it is able to decrypt, your private key, leaving your Google-key-encrypted username and password, which can be compared to the Google-key-encrypted database of bad credentials. Google says this technique, called “private set intersection,” means you don’t get to see Google’s list of bad credentials, and Google doesn’t get to learn your credentials, but the two can be compared for matches.

Read More

 




Microsoft is redesigning the 100 icons used in Windows 10 Ravensdale Digital

Microsoft is redesigning the 100 icons used in Windows 10

Microsoft is redesigning the 100 icons used for its apps and tools

Microsoft Windows10 support in Port Elizabeth

Microsoft users can expect to see over 100 new icons for its mobile apps and Windows utility tools in the coming year.

The company last year revealed 10 new Office icons, which attempted to “keep the tradition alive while gently pushing the envelope” with its Fluent Design System. Apps such as Outlook, Powerpoint, Word and Excel all retained a single letter in the icon (O, P, W, E and so on), but the letters were separated from the icon and appear to hover above it.

Microsoft has now scaled up that design change for over 100 icons, which include standalone apps, Windows utilities and mixed reality icons. The new icons were all “cut from the same cloth”, according to Jon Friedman, corporate vice president of design and research at Microsoft.

Read More

Ransomware: Cybercriminals are adding a new twist to their demands Ravensdale Digital

Ransomware: Cybercriminals are adding a new twist to their demands

Cybercriminals are adding a new twist to their demands

Pay the ransom or we’ll leak your data is the latest trend, warns cybersecurity company.

Cybercriminals Protection in Port Elizabeth, South Africa

Image: Emsisoft

Ransomware could be getting even nastier: a security firm is warning over a new trend among some cybercriminals to not just encrypt data, but steal some of it and use it as leverage to ensure a target pays up.

In several recent cases, it has been reported that the ransomware gang have not just encrypted data but also threatened to leak the data, too. Emsisoft says these attacks elevate the ransomware threat “to crisis level” and called on government organizations to immediately improve their security.

“If they do not, it is likely that similar incidents will also result in the extremely sensitive information which governments hold being stolen and leaked,” the cybersecurity company said.

Emsisoft said by its calculations that in 2019 across the US, ransomware attacks impacted at least 948 government agencies, educational establishments and healthcare providers at a potential cost in excess of $7.5 billion. The impacted organizations included 103 federal, state and municipal governments and agencies, 759 healthcare providers and 86 universities, colleges and school districts.

It said that the impact of ransomware included emergency patients being redirected to other hospitals, medical records made inaccessible and, in some cases, permanently lost, and emergency dispatch centres being forced to rely on printed maps and paper logs to keep track of emergency responders in the field.

Read More

 

Google will pay bug hunters up to R22m if they can hack its Titan M chip Ravensdale Digital

Google will pay bug hunters up to R22m if they can hack its Titan M chip

Google will pay bug hunters up to R22m if they can hack its Titan M chip

Google announced today that it is willing to dish out bug bounty cash rewards of up to $1.5 million (R22 million) if security researchers find and report bugs in the Android operating system that can also compromise its new Titan M security chip.

Launched last year, the Titan M chip is currently part of Google Pixel 3 and Pixel 4 devices. It’s a separate chip that’s included in both phones and is dedicated solely to processing sensitive data and processes, like Verified Boot, on-device disk encryption, lock screen protections, secure transactions, and more.

Read More

 

Google wants to call out slow sites with Chrome badging Ravensdale Digital

Google wants to call out slow sites with Chrome badging

Google wants to call out slow sites with Chrome badging

Google wants to call out slow sites with Chrome badging

Image: Google

Google has highlighted its intention to label slow sites in Chome, without laying out an exact plan for how it will go about doing it.

In a blog post, the Chrome team said it would take gradual steps to apply an “increasingly stringent criteria”, and this could eventually factor in items other than just page loading speed.

Read More

This unusual new ransomware is going after servers Ravensdale Digital

This unusual new ransomware is going after servers

This unusual new ransomware is going after servers

PureLocker ransomware appears to have links to some of the most prolific cybercriminal operations active in the world today.

An unconventional form of ransomware is being deployed in targeted attacks against enterprise servers – and it appears to have links to some of the most notorious cyber criminal groups around.

The previously undetected server-encrypting malware has been detailed in research by cyber security analysts at Intezer and IBM X-Force, who’ve named it PureLocker because it’s written in written in the PureBasic programming language.

It’s unusual for ransomware to be written in PureBasic, but it provides benefits to attackers because sometimes security vendors struggle to generate reliable detection signatures for malicious software written in this language. PureBasic is also transferable between Windows, Linux, and OS-X, meaning attackers can more easily target different platforms.

Read More

How to control location tracking on your iPhone in iOS 13 Ravensdale Digital

How to control location tracking on your iPhone in iOS 13

The latest version of iOS offers some convenient ways to manage location tracking by apps.

iOS 13 Location tracking

Image: Jason Cipriani/CNET

Tracking your location via your mobile device is something many apps and websites attempt to do. Developers, advertisers, and website vendors track your location not only to facilitate certain features but also to serve you targeted ads and other location-based content.

Of course, location tracking is a dicey area as many people aren’t comfortable with the loss of privacy. With the new version of iOS, Apple offers some handy tools for managing location tracking on your iPhone. Using the Location Services feature, you can set different options for each individual app that wants access to your location.

Read More

Apple Mail on macOS leaves parts of encrypted emails in plaintext Ravensdale Digital

Apple Mail on macOS leaves parts of encrypted emails in plaintext

Apple Mail on macOS leaves parts of encrypted emails in plaintext

Apple has known since July, but a fix is still not available.

 

Apple Mail encrypted issueImage: Bob Gendler

The Apple Mail app on macOS stores encrypted emails in plaintext inside a database called snippets.db.

The issue was discovered earlier this year by an Apple IT specialist named Bob Gendler.

The issue is not fixed at the time of writing, although Gendler told the company about it back in July. A fix is coming, according to tech news site The Verge; however, Apple did not provide a timeline.

Read More

ConnectWise warns of ongoing ransomware attacks targeting its customers Ravensdale Digital

ConnectWise warns of ongoing ransomware attacks targeting its customers

ConnectWise warns of ongoing ransomware attacks targeting its customers

ConnectWise

Image Source: ZDNet

Hackers are trying to break into on-premise ConnectWise Automate systems and install ransomware on customer networks.

ConnectWise, a Florida-based company that provides remote IT management solutions, is warning customers that hackers are targeting its software to gain access to client networks and install ransomware.

ConnectWise Automate is a software package that lets IT admins manage a company’s computer fleet and other IT assets from a central location. It’s a classic remote access/management solution that many large companies use when they have assets spread across a large number of locations.

The software is available in a cloud-based offering, but also as on-premise servers, for more secure setups.

Read More

What is Artificial Intelligence? Ravensdale Digital

What is Artificial Intelligence?

What is Artificial Intelligence?

It depends on who you ask.
Back in the 1950s, the fathers of the field Minsky and McCarthy, described artificial intelligence as any task performed by a program or a machine that, if a human carried out the same activity, we would say the human had to apply intelligence to accomplish the task.

That obviously is a fairly broad definition, which is why you will sometimes see arguments over whether something is truly AI or not.

AI systems will typically demonstrate at least some of the following behaviours associated with human intelligence: planning, learning, reasoning, problem-solving, knowledge representation, perception, motion, and manipulation and, to a lesser extent, social intelligence and creativity.

Read More

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Here you can change your Privacy preferences. It is worth noting that blocking some types of cookies may impact your experience on our website and the services we are able to offer.

Click to enable/disable Google Analytics tracking code.
Click to enable/disable Google Fonts.
Click to enable/disable Google Maps.
Click to enable/disable video embeds.
Our website uses cookies, mainly from 3rd party services. Define your Privacy Preferences and/or agree to our use of cookies.