Security

Cyber Security Reviews – Security will bring to our readers whats happening on the Security scene around the world.

0 Comments
A unique phishing template using fake fonts to evade detection and to better steal user credentials for a major US bank has been discovered, according to new research from Proofpoint. Researchers identified what they are calling a first-of-its kind phishing template that uses fake fonts to exploit web font features typically used by developers to deploy a
0 Comments
Researchers at Trend Micro discovered spyware that had successfully disguised itself as a legitimate Android application. Initially found in a game called Flappy Birr Dog, the malware has been widely distributed, affecting users from 196 different countries. According to research, the application was available on Google Play and had more than 100,000 recorded downloads from
0 Comments
Over 7.5 million players of online game Tower of Salem have been affected by a data breach at developer BlankMediaGames (BMG) over the Christmas holidays. Hacked database search engine provider DeHashed explained in a blog post on Tuesday that it was approached by email last week by someone with a full trove of newly breached data.
0 Comments
by John E Dunn As if the US newspaper industry doesn’t have enough to contend with, on the morning of 29 December one of its largest publishing groups, Tribune Media, found itself battling a major ransomware attack. This caused big problems for many newspapers in its stable including the Chicago Tribune and New York Daily
0 Comments
A notorious hacking group is claiming to have put up for sale stolen legal and other documents relating to the 9/11 terrorist attacks. The individual(s) known as ‘The Dark Overlord’ claimed in a lengthy Pastebin notice to have hacked insurance giants Hiscox Syndicates and Lloyds of London and World Trade Center developer Silverstein Properties. The
0 Comments
The agency at the helm of Singapore’s digital services, the Government Technology Agency of Singapore (GovTech Singapore), announced that Singapore will be working with security researchers over the course of three weeks on a bug bounty program intended to further protect Singapore citizens and help secure public-facing government systems. Singapore has established multiple cyber initiatives
0 Comments
by Maria Varmazis Intrusions into your Twitter account might range from mild annoyance, to a serious PR fail, to an international political gaffe. Regardless of how you use it, there’s no need to make it easier for someone who wants to hijack your Twitter account. It’s quite easy to improve the security of your Twitter
0 Comments
Nearly 20,000 Orange modems are being targeted thanks to a vulnerability leaking their SSID and Wi-Fi passwords, researchers at Bad Packets have warned. The firm’s honeypots first picked up the attack traffic targeting Orange Livebox ADSL modems. After conducting a simple Shodan search, chief research officer, Troy Mursch found 19,490 such devices leaking their Wi-Fi credentials
0 Comments
by Lisa Vaas About 11,000 passengers are crammed into Gatwick Airport, their flights grounded since last night as a drone operator repeatedly flew two unmanned aerial vehicles (UAVs) close to the runway. Flights can’t take off or land until it’s safe to do so, and that can’t happen until police find the operator. Gatwick, a
0 Comments
In response to the issues of data privacy questions that have erupted in the aftermath of the Facebook-Cambridge Analytical scandal, a startup, FigLeaf, co-founded by CEO Slava Kolomeichuk and CRO Yuriy Dvoinos, is developing an app that will help users understand how their personal information has been affected. The new app is slated for use
0 Comments
Southern University celebrated a first in its history with the graduation of Davonne Franklin, 22, a member of the Army National Guard who was the school’s first ever cybersecurity graduate. Franklin enrolled in the ROTC and attended Southern University after graduating from McKinley High in Baton Rouge. When he completed his basic training, he returned
0 Comments
by Lisa Vaas Nagging text messages help smokers to quit, Chinese researchers have found. In a clinical trial carried out across various cities and provinces in China, they pulled in 1,369 people (mostly men) who agreed to join a smoking-cessation program. Then, they divided them into three groups: subjects who received five text messages/day, those
0 Comments
All those who have relied upon the e-commerce giant Amazon to order their holiday gifts should heed caution when receiving order confirmation emails, as EdgeWave reportedly discovered a new and highly sophisticated malspam campaign sending fake Amazon order confirmation messages. The messages are reportedly quite convincing, and include subject lines that read “Your Amazon.com order,” “Amazon
0 Comments
The UK government has launched a new cybersecurity skills strategy designed to reduce industry shortages, and a new independent body to help shape the future of the profession. The Initial National Cyber Security Skills Strategy sets out not only to recruit more skilled professionals into the industry but also raise the awareness levels of the
0 Comments
Efforts to take down multiple domains that offered distributed denial-of-services (DDoSs) for hire were successful and resulted in another announcement from the Justice Department (DOJ), which yesterday declared that it had seized 15 internet domains, as well as filed criminal charges against three defendants who facilitated the computer attack platforms. According to a DOJ news release
0 Comments
by John E Dunn The second report in a week has analysed phishing attacks that are attempting – and probably succeeding – in bypassing older forms of two-factor authentication (2FA). The latest is from campaign group Amnesty International, which said it had detected two campaigns sending bogus account alerts targeting around 1,000 human rights defenders
0 Comments
Researchers have discovered a kernel-based vulnerability in a driver bundled with IBM Trusteer Rapport for MacOS, according to a recently published advisory from Trustwave. If exploited, the vulnerability could elevate privileges on the local machine, allowing an attacker to subvert or disable Trusteer altogether. According to Trustwave, its researchers worked with IBM throughout the disclosure process.
0 Comments
US chain Caribou Coffee announced a payment card data breach on Thursday, listing 265 outlets across 11 states that had been affected. It claimed to have identified unusual network activity on November 28, enlisting the help of Mandiant, which subsequently found evidence of unauthorized access to point of sales (POS) systems two days later. The