Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited

There’s word this morning about a serious issue with GMail accounts and a new phishig attack. It’s extremely effective and teh attackers are using compromised accounts as soon as they have credentials. Be careful out there. A new phishing technique that affects GMail and other services and how to protect yourself. Source: Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited

Google voice search records and keeps conversations people have around their phones – but the files can be deleted | The Independent

Today in “OMG! Panic!” I present Andrew Griffin’s piece in The Independent. It’s not new, but it’s exactly common knowledge:   Google could have a record of everything you have said around it for years, and you can listen to it yourself. The company quietly records many of the conversations that people have around its products. The feature works as a …

TV anchor says live on-air ‘Alexa, order me a dollhouse’ – guess what happens next • The Register

We’ll take this opportunity to point out that voice-command purchasing is enabled by default on Alexa devices. Well, that sounds extraordinarily dumb. Not entirely surprising, though. Somebody just didn’t think through the consequences. If you have one of these things, and who wouldn’t want Amazon listening to every word uttered within earshot of the device, you should immediately change your …

SkyNet isn’t a threat just yet

Good news: according to this experiment on Twitch, we don’t appear to have anything to worry about with machines banding together and wiping out humans: If you ever wanted to watch to virtual assistants argue with each other for hours on end, well, you’re in luck. Some maniac is live streaming two Google Homes arguing with each other, so of …

KillDisk Ransomware Now Targets Linux, Prevents Boot-Up, Has Faulty Encryption

Well, this is bad news to end the week on: Researchers have discovered a Linux variant of the KillDisk ransomware, which itself is a new addition to the KillDisk disk wiper malware family, previously used only to sabotage companies by randomly deleting data and altering files. To this point, Linux machines have been relatively safe from virus and malware authors. …

How to encrypt your entire life in less than an hour

“Only the paranoid survive.” — Andy Grove There’s some excellent advice here for anyone looking to keep the snoops & spooks out of their personal information. Not all seven tips are absolutely required, but everyone should definitely take heed of the first 5 of them: Use two-factor authentication for your email Encrypt your hard drive Password protect your mobile phone …