Get the ECT News Network Editor's Pick Newsletter » View Sample | Subscribe
Welcome Guest | Sign In
TechNewsWorld.com
Mobile Devices Under Siege by Cyberattackers
May 18, 2021
Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign into their personal mobile banking account.
Cybercops Scrub Botnet Software From Millions of Computers
April 27, 2021
The notorious Emotet botnet software began uninstalling itself from some one million computers Sunday. The uninstall command was part of an update sent to the infected computers by law enforcement servers in the Netherlands after Emotet's infrastructure was compromised in January during a multinational operation mounted by eight nations.
Fraud Awareness Kit Puts Businesses on Notice: It's Tax Scam Season
April 7, 2021
Businesses fearful their workers may be targeted by fraudsters will want to take a look at the free Tax Scam Awareness Kit offered by Proofpoint. The kit, for both Windows and macOS, includes materials for an employee education campaign about tax fraud, three educational videos, an infographic, answers to frequently asked questions about tax scams, and a tax scam flyer.
New Threat Report Finds Email Prime Vehicle for Malware
March 16, 2021
Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to filter out the infected correspondence.
Successful Phishers Make Slim Gains in 2020
February 24, 2021
Catastrophic events, like a pandemic, coupled with hasty technological change such as many people forced to work from home immediately, have been a rich environment in the past for phishers, who use deception to infect machines with malware, steal credentials, and invade corporate networks. However, malicious actors achieved only a marginal increase in success in 2020, according to a recent report.
Silver Sparrow Malware Hatched on 30,000 Macs
February 23, 2021
Nearly 30,000 Macs have been infected with a new malware strain. Discovered by researchers at Red Canary, the malware has been sitting on it hosts waiting for a payload that never arrived. In a statement provided to TechNewsWorld, Apple said that upon discovering the malware, it revoked the certificates of the developer accounts used to sign the packages, preventing new machines from being infected.
Microsoft Squelches Trickbot Ransomware Network
October 13, 2020
An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could no longer be used to initiate new infections or activate ransomware already planted on computer systems.
Hucksters Rake In $500K With Android, iOS Adware Scam Apps
September 23, 2020
Seven scamware apps found in Google Play and Apple's App Store corralled more than half a million dollars for their developers, according to Avast. The company discovered the malicious apps after a 12-year-old girl flagged a suspicious app promoted on a TikTok profile through its "Be Safe Online" project.
How to Protect Mobile Apps Against Sneaker Bots
September 16, 2020
Automated purchasing bots, also known as "sneaker bots," "click bots," "Instacart bots" and other names, are ruining the online shopping and gig economy experience for both consumers and workers. These bots can cause considerable damage to a mobile business' reputation and bottom line. There are a number of measures that e-tailers should take a to protect their mobile apps from sneaker bots.
Reported Data Breaches Decline in H1 2020
September 3, 2020
Data breaches were rampant in 2019, occurring at an unprecedented pace. However, the first half of this year has seen a reduction in the number of reported events. Reported being the operative word. In all, more than 15 billion records were exposed in nearly 7,100 data breaches last year. This year however, the number of publicly reported data breaches has decreased.
Software Piracy Spreading With the Virus
September 1, 2020
Software piracy involves much more than businesses and consumers using illegal copies of computer programs. What lurks within the pirated copies is often rogue code -- malware -- that can be just as deadly to computers and users' finances. Software companies are reporting that piracy has increased 20 to 30 percent due to COVID-19.
New Security Hole Puts Windows and Linux Users at Risk
July 29, 2020
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and Linux devices to attacks.
Email Scammers Using Old Tricks With New Twists
June 26, 2020
With much of the workforce conducting business from home to escape the pandemic, scammers have revved up their trickery to scare victims into falling for credential harvesting schemes. Two new reports lay bare the new twists digital scammers are putting on old approaches to get you to unwittingly give up login credentials.
Intel Says 'Tiger Lake' Will Drown Control-Flow Malware
June 16, 2020
The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacks, which is widely used in large classes of malware.
Microsoft, Intel Combine Deep Learning and Pixels to Nix Malware
May 13, 2020
Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be highly effective in detecting malware with a low rate of false positives.
Thunderbolt Flaw Opens Door for 'Evil Maid' Attack
May 12, 2020
A Dutch researcher has revealed a novel way to crack into a PC through a Thunderbolt port. The method, dubbed "Thunderspy" by researcher Björn Ruytenberg, sidesteps the login screen of a sleeping computer, as well as its hard disk encryption, to access all its data. "Thunderspy is stealth, meaning that you cannot find any traces of the attack. It does not require your involvement," he explained.
Risk Assessment: Buttress Account Security and Foil Fraudsters
March 30, 2020
Under ordinary circumstances, the average consumer can order a latte on the way to the coffee shop, book a last-minute trip to the coast, and come home to find groceries delivered -- all with the click of a button. What makes these transactions so smooth and effortless? It starts with account creation. Consumers increasingly are willing to create accounts with sites they interact with regularly.
Report: E-Commerce Account Takeovers, Shipping Fraud on the Rise
March 25, 2020
E-commerce account takeovers increased 347 percent and shipping fraud jumped 391 percent from 2018 to 2019, a fraud and identity solutions company reported. Fraudsters are gaining access to accounts using credential stuffing, romance scams, social engineering, phishing or hacking. The three-digit rise in account takeovers is connected to the rash of data breaches over the last decade.
Microsoft Leaves Necurs Botnet in Shambles
March 13, 2020
Microsoft and partners have disrupted the Necurs botnet group blamed for infecting more than 9 million computers globally. There are 11 botnets under the Necurs umbrella, all apparently controlled by a single group, according to Valter Santos, security researcher at Bitsight, which worked with Microsoft on the takedown. Four of those botnets account for about 95 percent of all infections.
COVID-19 and Computer Security, Part 1: Telecommuting Risks
March 12, 2020
The United States Office of Personnel Management last week urged agencies to prepare to allow federal employees to telework -- that is, work remotely.This came on the heels of the Department of Homeland Security closing its facilities in Washington state, after learning an employee had visited the Life Care facility in the city of Kirkland, which is ground zero for the state's COVID-19 outbreak.
Some Android Malware Can Break Your Phone When You Delete It
February 21, 2020
Since Android's unveiling in 2007, the platform has stayed true to its commitment to provide open and free source code. The source code is freely available to developers and device manufacturers who can, at their own discretion, install the software without worrying about the hassles of licensing fees. Android not only delivers cheaper smartphones -- it is the largest mobile OS in the world.
The Clear and Present Ransomware Danger
February 12, 2020
Ransomware hit at least 966 U.S. government agencies, educational establishments and healthcare providers in 2019, at a cost possibly exceeding $7.5 billion. The victims included 113 state and municipal governments and agencies; 764 healthcare providers; and 89 universities, colleges and school districts. Operations at up to 1,233 individual schools potentially were affected.
Philips Hue Vulnerability Shines Light on Possible IoT Security Nightmare
February 6, 2020
A vulnerability in Philips Hue smart lightbulbs and their controller bridges could allow intruders to infiltrate networks with a remote exploit, Check Point Software Technologies has disclosed. The researchers notified the owner of the Philips Hue brand about the vulnerability in November, and it issued a patched firmware version through an automatic update.
Saudi Hack of Bezos' Phone Shines Bright Light on Security Challenges
January 24, 2020
A digital forensic analysis conducted by FTI Consulting concludes with "medium to high confidence" that Amazon CEO Jeff Bezos' smartphone was hacked through a malicious file sent from the WhatsApp account of Saudi Arabian crown prince Mohammed bin Salman. The malware was in an MP4 file attached to a WhatsApp message. UN special rapporteurs released technical elements of the report.
Grabbing the Cybersecurity and Privacy Problems by the Horns: ECT News Roundtable, Episode 3
January 23, 2020
Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost in the gloom are the many ways security professionals have been working to shore up cyberdefenses.
Cybersecurity 2020: A Perilous Landscape
January 17, 2020
Cybersecurity is a very serious issue for 2020 -- and the risks stretch far beyond the alarming spike in ransomware. In addition to the daily concerns of malware, stolen data and the cost of recovering from a business network intrusion, there is the very real danger of nefarious actors using cyberattacks to influence or directly impact the outcome of the 2020 U.S. general election.
Clock Runs Out for Windows 7 Holdouts: Upgrade or Replace?
January 14, 2020
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some larger companies, and hordes of consumers holding onto aging personal computers.
Cybersecurity 2020: The Danger of Ransomware
January 10, 2020
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyberthieves to try again. Ransomware attacks increased 18 percent in 2019, up from an average 12 percent increase over the past five years.
Google's Chrome 79 Puts Heavy Emphasis on Security
December 12, 2019
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version has 51 security fixes. It offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Google recognizes the issues and has taken steps to fix them, noted James McQuiggan, security awareness advocate at KnowBe4.
Windows 7 End of Life
November 19, 2019
Microsoft will end support for Windows 7 on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or security updates that keep your IT systems safe. Uusing an unpatched out-of-date system is like leaving the door wide open.
See More Articles in Malware Section >>
Contact Center AI Explained by Pop Culture
When booking travel this summer, which is most important to you?
Cancelation Policy -- I must be able to change my plans conveniently and economically.
Cost -- I want the best deal my money can buy.
Covid-19 Protocol -- My transportation and lodging providers must employ strict health and safety procedures.
Travel Time -- The more time in transit, the higher the probability that something can go wrong.
I'm still too worried about the pandemic to consider traveling this summer.
Contact Center AI Explained by Pop Culture