Cybersecurity News
Sophisticated Android Ransomware Executes with the Home Button
The malware also has a unique machine-learning module.09 October 2020
CISOs Planning on Bigger Budgets: Report
Budgets are on the rise, even in a time of revenue worries across the industry.09 October 2020
German tech giant Software AG down after ransomware attack
Exclusive: The Clop ransomware gang is demanding more than $20 million from German tech firm Software AG.09 October 2020
Week in security with Tony Anscombe
Why deleting your personal data from social media may be impossible – How do you reset your face after a data breach? – The perils of working from a hotel
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
09 October 2020
55 security flaws found in various Apple services
Five ethical hackers have earned almost US$300,000 in bug bounty rewards – so far
The post 55 security flaws found in various Apple services appeared first on WeLiveSecurity
09 October 2020
Facebook Debuts Bug-Bounty ‘Loyalty Program’
Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports -- which will dictate new bonus percentages.09 October 2020
Chrome changes how its cache system works to improve privacy
Chrome 86, launched this week, introduces new privacy-focused "cache partitioning" mechanism.09 October 2020
Why MSPs Are Hacker Targets, and What To Do About It
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.09 October 2020
Wormable Apple iCloud Bug Allows Automatic Photo Theft
Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack.09 October 2020
Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.09 October 2020
US unveils enforcement framework to combat terrorist, criminal cryptocurrency activities
Blockchain technologies are described as “breathtaking,” but still, the US wants to tighten its grip on emerging criminal use cases.09 October 2020
Facebook launches bug bounty 'loyalty program'
Facebook to rank bug hunters based on past activity and provide bonuses and special perks.09 October 2020
So you thought your personal data was deleted? Not so fast
It may be impossible to delete your personal information from Houseparty and other social media services – despite privacy legislation!
The post So you thought your personal data was deleted? Not so fast appeared first on WeLiveSecurity
09 October 2020
Microsoft warns of Android ransomware that activates when you press the Home button
New MalLocker.B ransomware is currently spreading via online forums and third-party websites09 October 2020
Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.08 October 2020
RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims
Collectively, 240 fraudulent Android apps -- masquerading as retro game emulators -- account for 14 million installs.08 October 2020
Amid an Embarrassment of Riches, Ransom Gangs Increasingly Outsource Their Work
There's an old adage in information security: "Every company gets penetration tested, whether or not they pay someone for the pleasure." Many organizations that do hire professionals to test their network security posture unfortunately tend to focus on fixing vulnerabilities hackers could use to break in. But judging from the proliferation of help-wanted ads for offensive pentesters in the cybercrime underground, today's attackers have exactly zero trouble gaining that initial intrusion: The real challenge seems to be hiring enough people to help everyone profit from the access already gained.08 October 2020
Scale Up Threat Hunting to Skill Up Analysts
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.08 October 2020
US Seizes Domain Names Used in Iranian Disinformation Campaign
The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.08 October 2020
Cisco Fixes High-Severity Webex, Security Camera Flaws
Three high-severity flaws exist in Cisco's Webex video conferencing system, Cisco’s Video Surveillance 8000 Series IP Cameras and Identity Services Engine.08 October 2020