Cyber Security

0 Comments
Facebook owned Instagram and WhatsApp also affected by unexplained interruption Facebook along with some of its most prominent family of apps were down on Wednesday leaving users around the globe unable to use their favorite services for a prolonged period of time. It was the longest outage in the history of Facebook, but at the
0 Comments
Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software This is not the first time the gaming industry has been targeted by attackers who compromise game developers, insert backdoors into a game’s build environment, and then have their malware distributed as legitimate software. In April 2013, Kaspersky Lab reported that
0 Comments
Users should waste no time in updating to the browser’s latest version Google has revealed that the update for Google Chrome, rolled out late last week, addressed a security hole that attackers were already exploiting in the wild. “Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild,” the company noted
0 Comments
Some tips that businesses can do to get better at it without breaking the bank Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored,
0 Comments
The latest report from the Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018 The Anti-Phishing Working Group (APWG) has released its latest Phishing Activity Trends Report, which shows that the number of fraudulent websites designed to steal people’s sensitive data fell as 2018 went on. The drop –
0 Comments
The organization was the victim of a water-hole attack, likely attributable to the APT LuckyMouse group The International Civil Aviation Organization (ICAO) was a victim of a large-scale cyberattack back in 2016. Indeed, in November of that year, a cyber-intelligence analyst at Lockheed Martin contacted the international organization after finding that cybercriminals took control of
0 Comments
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads Days after the team behind Drupal urged website admins to apply an update patching a highly critical vulnerability in the content management system (CMS) platform, threat actors were spotted exploiting the loophole in the wild. The remote code execution
0 Comments
A new report shines some light on multiple aspects of the growing threat of cyber-extortion Criminals are trying to tempt people with promises of six-figure annual rewards in return for help with cyber-extortion campaigns that target high-net-worth individuals, research by the threat intelligence firm Digital Shadows shows. The prospective victims, such as corporate executives, lawyers
0 Comments
And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year Last week, as couples all over the world celebrated Valentine’s Day, we highlighted the risks of romance fraud. Even with V-Day safely behind us, it’s important to remain on high alert for online
0 Comments
An interview with ESET malware researcher Lukáš Štefanko about Android banking malware, the topic of his latest white paper Banking malware continued to plague the Android platform throughout 2018, with cybercrooks relentlessly targeting users with banking Trojans and fake banking apps, but also experimenting with new money-stealing techniques. To help users navigate the tricky and
0 Comments
Instead of financial gain or other, more usual, goals, the attacker leaves ‘scorched digital earth’ behind An unknown attacker has wrought rare havoc on email service provider VFEmail, wiping out all of the company’s data stored in the United States, according to an announcement on the firm’s website. Describing the incident as “catastrophic”, the company
0 Comments
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the ‘privacy’ of social media accounts When Starbucks introduced personalising the coffee shop experience by writing their customer’s names on their coffee cups people felt violated. Why on earth would a coffee