Philip Choo

0 Comments
What an irony — someone hacked the official website of the Monero cryptocurrency project and quietly replaced legitimate Linux and Windows binaries available for download with malicious versions designed to steal funds from users’ wallets. The latest supply-chain cyberattack was revealed on Monday after a Monero user spotted that the cryptographic hash for binaries he
0 Comments
Lucence Diagnostics, a genomic medicine startup that develops non-invasive tests for cancer screening, announced today that it has raised a $20 million Series A led by IHH Healthcare, one of the world’s largest integrated private healthcare groups. Other participants included SGInnovate and returning investors Heliconia Capital (a subsidiary of Temasek Holdings), Lim Kaling and Koh
0 Comments
A study conducted by cloud-based email security company Red Sift has found that only 12.5% of America’s top 100 retailers have taken steps to prevent fraudulent emails from landing in their customers’ inboxes. The worrying finding emerged after Red Sift researchers looked into the DMARC status of companies featured in STORES Magazine’s Top 100 Retailers for 2019, along with their subsidiaries. 
0 Comments
When software-defined WAN was first introduced, it quickly became synonymous with WAN transformation. If you were going to fix the ills of wide area networking, the road led through SD-WAN. But, in truth, SD-WAN ignores many other networking and security challenges that face the digital business. A new architecture is taking hold that some analysts
0 Comments
Disney’s new video-on-demand streaming service has been compromised within a week of its being launched, with hacked Disney+ accounts offered for sale online for just $1.  According to The Daily Dot, the hugely popular Disney+ service, which amassed over 10 million subscribers on its first day alone, was targeted by threat actors from the get-go.  Within hours
0 Comments
Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware. Though the new malware campaigns are not customized for each organization, the threat actors appear
0 Comments
It was the one of the best phishing emails we’ve seen… that wasn’t. Phishing remains one of the most popular attack choices for scammers. Phishing emails are designed to impersonate companies or executives to trick users into turning over sensitive information, typically usernames and passwords, so that scammers can log into online services and steal
0 Comments
Ethical hackers from around the world have been invited to discover and fix vulnerabilities in Japan’s largest messaging app.  LINE Corporation today launched a public bug bounty program (BBP), offering hackers financial rewards for identifying glitches throughout LINE’s web domains and core messenger application. The program will run through HackerOne, which LINE has been using since July
0 Comments
by Danny Bradbury An anonymous cybercriminal (or perhaps a gang) whose over-pilfering from a victim’s filesystem blew the “disk full” whistle on their massive data-stealing operation. The Federal Trade Commission (FTC) has reached a settlement with InfoTrax, a Utah-based company that provides business operations software for multi-level marketers, after thieves stole a million sensitive customer
0 Comments
Next month marks the 30th anniversary of the first ever ransomware attack, and according to new research this particular form of malware is still going strong.  According to the “Mid-Year Threat Landscape Report“ published yesterday by Bitdefender, ransomware increased 74.23% year on year in the first six months of 2019.  Researchers noted a change in the ransomware landscape following the fall
0 Comments
Security researchers found vulnerabilities in the Qualcomm TrustZone secure element extension that could allow attackers to steal the most sensitive data stored on mobile devices. TrustZone implements architectural security extensions on ARM processors that can be integrated into the bootloader, radio, Android system image and a trusted execution environment (TEE) in mobile devices. Slava Makkaveev,
0 Comments
The recent controversies surrounding the WhatsApp hacking haven’t yet settled, and the world’s most popular messaging platform is in choppy waters once again. The Hacker News has learned that WhatsApp has recently patched yet another critical vulnerability that could have allowed attackers to remotely compromise targeted devices and potentially steal secured chat messages and files
0 Comments
New research published today by Zix-AppRiver has revealed that 61% of US executives feel powerless to stop employees holiday shopping on company devices, despite knowing that the practice poses a cybersecurity threat to the business. Researchers asked 1,049 cybersecurity decision-makers within American SMBs across a diverse range of industry sectors about the holiday shopping habits of their employees.  According
0 Comments
by John E Dunn More than a decade after it first emerged, is the world any closer to stopping ransomware? Judging from the growing toll of large organisations caught out by what has become the weapon of choice for so many criminals, it’s tempting to conclude not. The problem for defenders, as documented in SophosLabs’