Month: July 2018

0 Comments
More and more, ransomware attacks are targeting one specific industry – health care. As detailed in our McAfee Labs Threats Report: March 2018, health care experienced a dramatic 210% overall increase in cyber incidents in 2017. Unfortunately, 2018 is showing no signs of slowing. In fact, just this week it was revealed that patient records
0 Comments
Summary In 2015, the SecureWorks® Counter Threat Unit™ (CTU) research team documented the BRONZE UNION threat group (formerly labeled TG-3390), which CTU™ analysis suggests is based in the People’s Republic of China (PRC). Since that analysis, CTU researchers have observed multiple BRONZE UNION threat campaigns that illustrate the evolution of the group’s methods and espionage
0 Comments
Logitech today announced its intention to acquire Blue Microphones, the hardware company behind popular podcasting microphones like the Yeti and Snowball. It’s a pretty logical acquisition, as far as these things goog –Logitech already operates in the audio space, with speakers and gaming headsets. The acquisition of Blue would add an important dimension to that
0 Comments
By using the HiBids advertising platform, cyber-criminals have been delivering malicious advertisements to millions of victims worldwide in a large-scale malvertising and banking Trojan campaign, according to researchers at Check Point. These malicious ads can infect the PC or mobile device of the person viewing the ads with malware, such as a crypto-miner, ransomware or a banking
0 Comments
Symantec’s identity theft protection service, LifeLock, exposed millions of customers’ email addresses. According to security journalist Brian Krebs, the LifeLock vulnerability was in the company’s website, and it enabled unauthorized third parties to collect email addresses associated with LifeLock user accounts or unsubscribe users from communications from the company. Account numbers, called subscriber keys, appear
0 Comments
Researchers from Israel’s Ben-Gurion University of the Negev showed how a power cable could enable hackers to steal… data from air-gapped computers. What is this vulnerability, and how can it be exploited? PowerHammer is a proof-of-concept malware program the researchers created to take advantage of a vulnerability in power lines that enables attackers to exfiltrate
0 Comments
Several dummy units of future iPhone models have leaked over the weekend. It gives a good idea of what you should expect to see in September when Apple introduces the next iPhone. Most likely, the iPhones on these photos aren’t actual iPhones. They are just dummy units. Every year, a few manufacturers create objects that
0 Comments
A UK parliamentary committee which has been running a multi-month investigation into the impact of online disinformation on political campaigning — and on democracy itself — has published a preliminary report highlighting what it describes as “significant concerns” over the risks to “shared values and the integrity of our democratic institutions”. It’s calling for “urgent
0 Comments
Here is the DJI Mavic 2 before you’re supposed to see it. Just like the original, it’s a small, foldable drone with amazing capabilities. This time around, there will two different version, the Zoom and the Pro, though both will reportedly have the ability to fly at 45mph with a range of five miles. DJI
0 Comments
Summary In early 2017, SecureWorks® Counter Threat Unit™ (CTU) researchers observed phishing campaigns targeting several entities in the Middle East and North Africa (MENA), with a focus on Saudi Arabian organizations. The campaigns delivered PupyRAT, an open-source cross-platform remote access trojan (RAT). CTU™ researchers observed likely unsuccessful phishing campaigns being followed by highly targeted spearphishing
0 Comments
Federal agency issues Notices of Violation to Datablocks and Sunlight Media for allegedly facilitating the installation of malware through online advertising On July 11, 2018, the Canadian Radio-television and Telecommunications Commission (CRTC) imposed sanctions against the installation of malicious software through online advertising for the first time in its history. This decision was taken under the provisions
0 Comments
A study assessed whether or not the most popular English-language websites help users strengthen their security by providing them with guidance on creating safer passwords during account sign-up or password-change processes Some of the Internet’s biggest names largely fall short of nudging users towards safer choices when they create or change their passwords, a study
0 Comments
Patches have already been released or are expected to see the light of day soon Researchers have discovered a flaw in some Bluetooth implementations that could allow an attacker to intercept or tamper with data exchanged between two vulnerable devices. The cryptographic bug, tracked as CVE-2018-5383, has been identified by scientists at the Israel Institute
0 Comments
It might seem legit but there are several reasons why you should not always hit the panic button when someone claims to have your email password In the official trailer to a 1965 horror-thriller film, a series of land-line telephone handsets (remember them?) are shown ringing, and the voice-over says in an increasingly urgent voice,
0 Comments
This is bad news for many websites that have yet to embrace encrypted connections Google has rolled out the much-anticipated version 68 of its Chrome browser that, most importantly, labels HTTP websites as “Not secure”. Available for Windows, Mac and Linux, Chrome’s latest iteration inserts a “not secure” indicator to the left of the URL