Spam Kingpin Peter Levashov Gets Time ServedA federal judge in Connecticut today handed down a sentence of time served to spam kingpin Peter “Severa” Levashov, a prolific purveyor of malicious and junk email, and the creator of malware strains that infected millions of Microsoft computers globally. Levashov has been in federal custody since his extradition to the United States and guilty plea in 2018, and was facing up to 12 more years in prison. Instead, he will go free under three years of supervised release and a possible fine.
Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple AccountabilityOur roundtable of experts weighs in on implications for Apple and lawmakers in the wake of the bombshell report showing widespread surveillance of dissidents, journalists and others.
Back-to-Basics: Reduce Where Payment Data Can Be Found
As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s blog focuses on reducing where payment data can be found.
Law Firm to the Fortune 500 Breached with RansomwareDeep-pocketed clients' customers & suppliers could be in the attacker's net, with potential PII exposure from an A-list clientele such as Apple, Boeing and IBM.
Why Your Business Needs a Long-Term Remote Security StrategyChris Hass, director of information security and research at Automox, discusses the future of work: A hybrid home/office model that will demand new security approaches.
16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows MachinesThe bug could allow cyberattackers to bypass security products, tamper with data and run code in kernel mode.
A New Security Paradigm: External Attack Surface ManagementAdvanced EASM solutions are crucial to automating the discovery of the downstream third-party (or fourth-party, or fifth-party, etc.) IT infrastructures that your organization is exposed to, and may be vulnerable to attack, posing a critical risk for your organization.
MosaicLoader Malware Delivers Facebook Stealers, RATsThe newly documented code is a full-service malware-delivery threat that's spreading indiscriminately globally through paid search ads.
Some URL shortener services distribute Android malware, including banking or SMS trojans
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
The post Some URL shortener services distribute Android malware, including banking or SMS trojans appeared first on WeLiveSecurity