Cyber Security

0 Comments
Cyberblackmail/sextortion again raises its not-so-pretty little head Vox Emptoris: “Voice of the Customer” For more than 30 years, I’ve had the privilege of assisting people get rid of viruses and other malicious software.  In the course of doing so, I’ve often been asked questions about computer security-related topics that are not product-specific.  Some are simple or
0 Comments
The electric automaker is working to release a fix for the underlying vulnerability in a matter of days A duo of white-hat hackers have earned themselves a brand new Tesla Model 3 after exposing a vulnerability in the car’s integrated browser. Richard Zhu and Amat Cam, aka team ‘Fluoroacetate’, managed to break into the electric
0 Comments
ESET researchers detail the latest tricks and techniques OceanLotus uses to deliver its backdoor while staying under the radar This article will first describe how the OceanLotus group (also known as APT32 and APT-C-00) recently used one of the publicly available exploits for CVE-2017-11882, a memory corruption vulnerability present in Microsoft Office software, and how
0 Comments
More advice for detecting and avoiding sextortion scams Vox Emptoris: “Voice of the Customer” In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was not a threat to be taken seriously.  But that kind of analysis – point-by-point deconstruction – is relatively hard work, and perhaps not
0 Comments
Facebook owned Instagram and WhatsApp also affected by unexplained interruption Facebook along with some of its most prominent family of apps were down on Wednesday leaving users around the globe unable to use their favorite services for a prolonged period of time. It was the longest outage in the history of Facebook, but at the
0 Comments
Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software This is not the first time the gaming industry has been targeted by attackers who compromise game developers, insert backdoors into a game’s build environment, and then have their malware distributed as legitimate software. In April 2013, Kaspersky Lab reported that
0 Comments
Users should waste no time in updating to the browser’s latest version Google has revealed that the update for Google Chrome, rolled out late last week, addressed a security hole that attackers were already exploiting in the wild. “Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild,” the company noted
0 Comments
Some tips that businesses can do to get better at it without breaking the bank Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored,
0 Comments
The latest report from the Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018 The Anti-Phishing Working Group (APWG) has released its latest Phishing Activity Trends Report, which shows that the number of fraudulent websites designed to steal people’s sensitive data fell as 2018 went on. The drop –
0 Comments
The organization was the victim of a water-hole attack, likely attributable to the APT LuckyMouse group The International Civil Aviation Organization (ICAO) was a victim of a large-scale cyberattack back in 2016. Indeed, in November of that year, a cyber-intelligence analyst at Lockheed Martin contacted the international organization after finding that cybercriminals took control of
0 Comments
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads Days after the team behind Drupal urged website admins to apply an update patching a highly critical vulnerability in the content management system (CMS) platform, threat actors were spotted exploiting the loophole in the wild. The remote code execution
0 Comments
A new report shines some light on multiple aspects of the growing threat of cyber-extortion Criminals are trying to tempt people with promises of six-figure annual rewards in return for help with cyber-extortion campaigns that target high-net-worth individuals, research by the threat intelligence firm Digital Shadows shows. The prospective victims, such as corporate executives, lawyers
0 Comments
And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year Last week, as couples all over the world celebrated Valentine’s Day, we highlighted the risks of romance fraud. Even with V-Day safely behind us, it’s important to remain on high alert for online