Security

Cyber Security Reviews – Security will bring to our readers whats happening on the Security scene around the world.

0 Comments
Researchers suspect that a new stealer malware dubbed Baldr, first detected in January, has incorporated three known threat actors, according to Malwarebytes. In today’s blog post, researchers said that Baldr has earned positive reviews on Russian hacking forums for its use of three threat actors: Agressor for distribution, Overdot for sales and promotion and LordOdin for development.
0 Comments
With the use of deep learning, researchers Yisroel Mirsky, Tom Mahler, Ilan Shelef and Yuval Elovici at Cyber Security Labs at Ben-Gurion University demonstrated in a video proof of concept (PoC) that an attacker could fool three expert radiologists by falsifying CT scans, inserting or removing lung cancer, the Washington Post reported.  “In 2018, clinics and
0 Comments
Regulators in Australia are cracking down on social media sites in the aftermath of the deadly shooting at two mosques in Christchurch that killed 50 people, according to Reuters. The Criminal Code Amendment (Sharing of Abhorrent Violent Material) Act 2019 would prohibit social media sites and internet or hosting services from allowing “abhorrent violent material.” Such material would
0 Comments
by Lisa Vaas Should you “share, share, share” the “urgent warning” that hackers are “posting sexual videos and pictures on your walls” that are completely invisible to you? No, you should not sharedy-sharedy-SHARE-share-share, because this latest viral Facebook copy-and-paste-me warning is just another social media sneeze, spreading its hoaxy germs in spite of the fact
0 Comments
Researchers at Cisco Talos detected an excess of 70 Facebook groups that have been selling black-market cyber-fraud services, some of which have managed to remain on Facebook for up to eight years, according to a Talos Intelligence blog post. For several months, researchers have been investigating online criminal flea markets on Facebook, discovering a collective
0 Comments
Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch, security researcher for Bad Packets. Researchers have detected different types of attacks that are targeting consumer routers, all of which were reportedly traced back to hosts on the Google Cloud Platform
0 Comments
Evolving malware continues to pose threats to business, and new research has revealed a rise in the use of document-based malware since the start of 2019. According to the newest Threat Spotlight from Barracuda Networks, researchers analyzed emails and identified more than 300,000 unique malicious documents, representing 48% of all malicious files detected in the
0 Comments
Another ransomware attack has struck, but this time the massive attack on AriZona Beverages was targeted. After more than 200 company-networked computers displayed the message “Your network was hacked and encrypted,” the company’s IT department had to rebuild the network, according to a post from Cloud Management Suite. Infosecurity was unable to reach AriZona Beverages
0 Comments
Employees at Google are less than thrilled with a newly announced member of its Advanced Technology External Advisory Council (ATEAC), according to MIT Technology Review.   At the EmTech Digital event in San Francisco, Google reportedly announced the names of its eight-member advisory council tasked with providing feedback and support for artificial intelligence (AI) projects. One
0 Comments
by Lisa Vaas We’ve seen malicious government cyberweapons leaked out of the National Security Agency (NSA) and injected via ransomware, but security researchers recently found government spyware squatting in plain sight, pretending to be harmless vanilla apps on Google’s Play store. This time around, the malware doesn’t come from the NSA. Rather, it alegedly comes
0 Comments
by John E Dunn Russia has been conducting a major campaign to experimentally hijack signals sent by Global Navigation Satellite Systems (GNSS) systems such as GPS, researchers have claimed in a detailed report. Technically, GNSS spoofing (as opposed to simpler jamming) is an attempt to send false positional signals to a receiver using global satellite
0 Comments
At this week’s Black Hat Asia 2019 conference, researchers from Positive Technologies revealed findings about an undocumented technology in Intel microchips that allow reading data from the memory of and intercepting the signals from peripherals. On March 28, 2019, Positive Technologies experts Maxim Goryachy and Mark Ermolov spoke in Singapore, discussing the microchips in their session
0 Comments
After researchers discovered an SQL injection vulnerability in Magento’s code, the company issued a security fix for more than 30 different vulnerabilities in its software, which reportedly has put more than 300,000 e-commerce sites at risk of card-skimming attacks. Online businesses have been strongly urged to download the latest fix, warning that versions prior to 2.3.1
0 Comments
Though backup is a known best-practice approach to IT risk management, many companies are overwhelmed by the number of sites that need to be backed up, according to a new survey released today by Barracuda Networks. The study, Closing Backup and Recovery Gaps, asked more than 1,000 IT professionals, business executives and backup administrators about
0 Comments
An LGBTQ dating app, Grindr, has come under fire after Reuters reported that the Committee on Foreign Investment in the United States (CFIUS) told the app’s China-based parent company that its ownership posed a national security risk. Now, the Chinese gaming company, Beijing Kunlun Tech Co Ltd, is reportedly looking to sell Grindr LLC, which it
0 Comments
Cyber-criminals have long relied on the Dark Web’s largest marketplace, Dream Market, to buy and sell illicit goods, but today threat researchers at IntSights and Flashpoint found that the notorious online store is scheduled to shutdown on April 30, 2019. On March 26, multiple threat actors posted on the DNM Avengers forum after purportedly receiving
0 Comments
by John E Dunn Apple yesterday released updates across a range of its products, including macOS, which goes to 10.14.4 and iOS, which is now at version 12.2. WebKit and beyond In terms of numbers, the system component with the most entries in the update list is Apple’s browser core, known as WebKit, which gets