0 Comments
A new report shines some light on multiple aspects of the growing threat of cyber-extortion Criminals are trying to tempt people with promises of six-figure annual rewards in return for help with cyber-extortion campaigns that target high-net-worth individuals, research by the threat intelligence firm Digital Shadows shows. The prospective victims, such as corporate executives, lawyers
0 Comments
YouTube will demonetize channels that promote anti-vaccination views, after a report by BuzzFeed News found ads, including from health companies, running before anti-vax videos. The platform will also place a new information panel that links to the Wikipedia entry on “vaccine hesitancy” before anti-vax videos. Information panels (part of YouTube’s efforts to combat misinformation) about
0 Comments
VirusTotal introduced an enterprise version that provides a faster malware search feature and uses N-gram content searches to identify threats. What is an N-gram content search and why is it so important? The practice of identifying threats and sharing information about those threats with defenders was an extension of signature techniques that have long been
0 Comments
An analysis of multiple top password manager products has shockingly revealed that the tools don’t actually safeguard passwords as promised, according to Independent Security Evaluators (ISE). A new study, Under the Hood of Secrets Management, found that a variety of different password managers, including 1Password and LastPass, have fundamental flaws that expose rather than protect
0 Comments
Every couple of months, I talk to an entrepreneur who is interested in building a marketplace for buying and selling app businesses (i.e. the actual IP and ownership of an app or other piece of software). These markets always seem to suffer from a lack of liquidity, and one reason why is that it’s really
0 Comments
by Lisa Vaas Last week, CNBC reported that Facebook looks up users’ location data when it thinks they’re a threat to the company’s employees or facilities. Until recently, granting an Android app access to your location was an all-or-nothing deal: you either had to turn off location and prevent the app from seeing your location
0 Comments
Next week, Mobile World Congress (MWC) will kick off in Barcelona. This year’s event will have an estimated 107,000 attendees, along with 2,400 exhibitors, all representing about 205 countries. While the focus of the event is mobility, we can expect the industry to continue to drive conversations around IoT, artificial intelligence, 5G, connectivity, and more.
0 Comments
And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year Last week, as couples all over the world celebrated Valentine’s Day, we highlighted the risks of romance fraud. Even with V-Day safely behind us, it’s important to remain on high alert for online
0 Comments
A vulnerable ConnectWise plugin led to several managed service providers being infected with GandCrab ransomware, but a new decryptor tool has provided relief for at least one of the victims. The vulnerable ConnectWise plugin was designed to sync data between the ConnectWise professional service automation software and the Kaseya VSA remote monitoring and management software.
0 Comments
by Danny Bradbury Hacker Lauri Love has failed to get his computers back six years after the UK’s National Crime Agency took them as part of a criminal investigation. In 2013, British authorities arrested Love for alleged hacking into US institutions, and seized his computers. However, he wasn’t charged because the information on his computers
0 Comments
Beware Windows users… a new dangerous remote code execution vulnerability has been discovered in the WinRAR software, affecting hundreds of millions of users worldwide. Cybersecurity researchers at Check Point have disclosed technical details of a critical vulnerability in WinRAR—a popular Windows file compression application with 500 million users worldwide—that affects all versions of the software
0 Comments
There’s plenty of speculation right now around apparently disgruntled investors in SoftBank’s Vision Fund, but the drum continues to beat and the checks continue to be written. The latest deal for the $100 billion mega-fund is Clutter, an on-demand storage company that pulled in $200 million in new financing for growth. Eagled-eyed viewers will recall that
0 Comments
In collaboration with Bill Siegel and Alex Holdtman from Coveware. At the beginning of 2019, McAfee ATR published an article describing how the hasty attribution of Ryuk ransomware to North Korea was missing the point. Since then, collective industry peers discovered additional technical details on Ryuk’s inner workings, the overlap between Ryuk and Hermes2.1, and
0 Comments
A researcher recently discovered an info-stealer — dubbed Vidar — that is a part of a multi-payload and ongoing malvertising attack that also distributes GandCrab ransomware. How does this double attack work? Who is a target for the attack and how can it be mitigated? Malware infections haven’t changed much over time, even taking into
0 Comments
The majority of vulnerabilities in 2018 were associated with network vulnerabilities, while less than 20% were associated with web applications and APIs, according to the fourth annual Vulnerability Stats Report from Edgescan. When it comes to breaches, though, web application security remains the area of greatest risk. “The percentage of high and critical risks combined,