web analytics

‘Virus-scanning’ iOS apps have always been a scam. Now Apple is finally cracking down

September 15th, 2017  By Karissa Bell   Misleading iOS “security” apps are about to be a thing of the past.   Apple has updated its developer guidelines with a new policy that bans deceptive “virus-scanning” apps for the first time.   From the latest App Store guidelines: You should not market your app on the… Continue reading ‘Virus-scanning’ iOS apps have always been a scam. Now Apple is finally cracking down

Cyber News Rundown: Edition 9/15/17

    Cyber News Rundown: Edition 9/15/17   German Voting Software Raises Concerns   With German elections only a couple weeks away, researchers have been working to determine how secure the voting systems really are. Per a recent study, the software being used contains multiple vulnerabilities that could lead to devastating results if the election is… Continue reading Cyber News Rundown: Edition 9/15/17

OurMine Leaks Huge Cache of Vevo Information Online

September 15th, 2017  By Tara Seals   OurMine has claimed another victim, lifting roughly 3.12TB worth of internal files from Vevo and posting them online.   The majority of the files taken from the music video giant include benign data including weekly music charts, pre-planned social media content and various details about the artists under… Continue reading OurMine Leaks Huge Cache of Vevo Information Online

Explained: YARA rules

September 15th, 2017 By Pieter Arntz   YARA rules are a way of identifying malware (or other files) by creating rules that look for certain characteristics. YARA was originally developed by Victor Alvarez of Virustotal and is mainly used in malware research and detection. It was developed with the idea to describe patterns that identify… Continue reading Explained: YARA rules

HWP Documents and PostScript Abused to Spread Malware

By Ionut Arghire on September 15, 2017   A recently malware attack has been leveraging the Hangul Word Processor (HWP) word processing application and its ability to run PostScript code, Trend Micro reveals.   Highly popular in South Korea, HWP has been long used in targeted attacks to perform reconnaissance or to spread remote access… Continue reading HWP Documents and PostScript Abused to Spread Malware

Yet another trove of sensitive US voter records has leaked

By Zack Whittaker for Zero Day | September 14, 2017 Each record contained details on voters, including names, addresses, dates of birth, their ethnic identity, whether an individual is married, and the individual’s voting preferences.   The records, totaling 593,328 individual sets of records, appear to contain every registered voter in the state of Alaska,… Continue reading Yet another trove of sensitive US voter records has leaked

Malvertising Campaign Mines Cryptocurrency Right in Your Browser

September 14, 2017 By Catalin Cimpanu     Malware authors are using JavaScript code delivered via malvertising campaigns to mine different cryptocurrencies inside people’s browsers, without their knowledge.   Crooks are currently deploying this technique on Russian and Ukrainian websites, but expect this trend to spread to other regions of the globe.   Full Article.… Continue reading Malvertising Campaign Mines Cryptocurrency Right in Your Browser

Fending Off Privacy Invasion

Internet users in the U.S. have seen internet privacy protections diminish significantly in the post-9/11 era. In just March of this year, Congress swiftly (and quietly) did away with federal privacy regulations that prevented internet service providers from selling their customers’ browsing histories without consent.   In recent years, products intended to deliver conveniences directly to our… Continue reading Fending Off Privacy Invasion

Trouble in Paradise as Cyber Attackers Circumvent 2FA

By Markus Jakobsson on September 14, 2017   Two-Factor Authentication (2FA) has for years been one of the very dependable security technologies that was invoked to address high-risk scenarios — whether to safeguard enterprise resources  accessed through the firewall, financial accounts, or — for high-value targets — protect each email login. Most people, to the… Continue reading Trouble in Paradise as Cyber Attackers Circumvent 2FA

‘ExpensiveWall’ malware is the latest Android security threat – and you may be infected

September 14, 2017   By Jason Murdock   It still remains unclear as to how many devices were infected by the Android malware family before Google took it down.REUTERS/Dado Ruvic/Illustration A strain of Android malware that sends fraudulent premium SMS messages and charges users’ accounts for services without their knowledge was recently found lurking in more… Continue reading ‘ExpensiveWall’ malware is the latest Android security threat – and you may be infected