Month: January 2019

0 Comments
It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping
0 Comments
It’s Huawei vs. the U.S., the U.K., Canada, Australia, New Zealand, and most of Europe and Japan. It’s almost as if the world’s biggest surveillance superpowers don’t want Huawei cell tower and networking router equipment inside critical networks in their countries, amid concerns of the company’s links to the Chinese military. Huawei, they say, could
0 Comments
SIM swapping is reportedly on the rise. How do SIM swaps work, and what are the best ways to prevent it? Mobile phones are often an important part of two-factor authentication (2FA) processes, but they have certain security risks like ordinary single-factor password processes. For devices connected to cellular networks, SIM swaps can open a
0 Comments
Executives at financial services companies are increasingly concerned about risks, but as technology becomes more integrated in managing financials, more executives say that cybersecurity is increasingly becoming the most important type of risk, according to a new Deloitte survey, Global Risk Management Survey, 11th Edition. When asked which risk types would grow in importance over
0 Comments
Smart TVs give viewers instant access to streaming apps and provide a never-ending supply of binge-worthy shows and movies. But does this convenience come with a cost? Are internet-connected TVs as vulnerable to cybercrime as other smart devices? In the latest episode of “Hackable?” our host Geoff Siskind plays a prank on our producer Pedro
0 Comments
Multiple consumers have reported being terrified after hackers infiltrated the Nest cameras in their homes, with one malicious actor making claims of a North Korean missile threat, according to CBS News. California resident Laura Lyons reported that malicious actors gained control of her Nest security camera, which belted out a terrifying emergency alert warning them to
0 Comments
by Mark Stockley Thanks to Sophos expert Peter Mackenzie for the research in this article. Emotet is malware that’s designed to evade detection, dig in hard and multiply. Thanks to a restless update schedule, a modular, polymorphic design, and its ability to deploy a host of different techniques for worming through networks, the software is
0 Comments
A blood-splattered Theranos machine nearly pricks an employee struggling to fix it. This gruesome graphical rendering is what you’ll walk away from HBO’s “The Inventor” with. It finally gives a visual to the startup’s laboratory fraud detailed in words by John Carreyrou’s book “Bad Blood”. The documentary that premiered tonight at Sundance Film Festival explores
0 Comments
An Apple security expert last year documented an attack technique that uses synthetic clicks to bypass security features in macOS High Sierra. What are synthetic clicks and how does this attack work? Once malware is put on an endpoint, multiple vulnerabilities can be used for local privilege escalation. The malware could contain traditional executables, such
0 Comments
A new cybersecurity curriculum targeting junior Girl Scouts aged 9-11 aims to shift the image of the young girls in green from cookie distributors to cyber defenders, according to news from Hewlett Packard Enterprise (HPE). HPE has teamed up with the Girl Scouts to launch a cybersecurity education program specifically for young girls to learn and
0 Comments
by Danny Bradbury A bomb threat spam campaign that hit North America last month may have been engineered using a flaw in GoDaddy’s domain management process, it was revealed this week. The campaign saw attackers send out spam emails warning recipients that their places of work would be bombed unless they sent payments in bitcoin.
0 Comments
Everybody loves quizzes. So why not take this one and hone your phish-spotting prowess? Google’s technology incubator Jigsaw has revealed a quiz that tests users’ abilities to identify phishing attacks. In asking you to distinguish legitimate emails from phishing scams, the test reveals some of the most common scenarios that fraudsters use with a view
0 Comments
China has blocked Microsoft-owned search engine Bing, the company confirmed after receiving complaints from users throughout the country who took to social media beginning late Wednesday to express concerns. So, Bing becomes the latest service to be shut down by Chinese government behind its so-called Great Firewall of China, which blocks thousands of websites originating
0 Comments
As 2018 rounded to a close, Malwarebytes predicted that Emotet and Trickbot were the future of malware, and the third annual State of Malware Report released today confirms that the Trojan families spread wildly, most often targeting the education, government, manufacturing and healthcare sectors. The old adage, “When one goes up, the other comes down,”