Cybersecurity News


Sophisticated Android Ransomware Executes with the Home Button

Sophisticated Android Ransomware Executes with the Home Button The malware also has a unique machine-learning module.
09 October 2020

CISOs Planning on Bigger Budgets: Report

Budgets are on the rise, even in a time of revenue worries across the industry.
09 October 2020

German tech giant Software AG down after ransomware attack

Exclusive: The Clop ransomware gang is demanding more than $20 million from German tech firm Software AG.
09 October 2020

Week in security with Tony Anscombe

Why deleting your personal data from social media may be impossible – How do you reset your face after a data breach? – The perils of working from a hotel

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

09 October 2020

55 security flaws found in various Apple services

Five ethical hackers have earned almost US$300,000 in bug bounty rewards – so far

The post 55 security flaws found in various Apple services appeared first on WeLiveSecurity

09 October 2020

Facebook Debuts Bug-Bounty ‘Loyalty Program’

Facebook Debuts Bug-Bounty ‘Loyalty Program’ Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports -- which will dictate new bonus percentages.
09 October 2020

Chrome changes how its cache system works to improve privacy

Chrome 86, launched this week, introduces new privacy-focused "cache partitioning" mechanism.
09 October 2020

Why MSPs Are Hacker Targets, and What To Do About It

Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
09 October 2020

Wormable Apple iCloud Bug Allows Automatic Photo Theft

Wormable Apple iCloud Bug Allows Automatic Photo Theft Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack.
09 October 2020

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
09 October 2020

US unveils enforcement framework to combat terrorist, criminal cryptocurrency activities

Blockchain technologies are described as “breathtaking,” but still, the US wants to tighten its grip on emerging criminal use cases.
09 October 2020

Facebook launches bug bounty 'loyalty program'

Facebook to rank bug hunters based on past activity and provide bonuses and special perks.
09 October 2020

So you thought your personal data was deleted? Not so fast

It may be impossible to delete your personal information from Houseparty and other social media services – despite privacy legislation!

The post So you thought your personal data was deleted? Not so fast appeared first on WeLiveSecurity

09 October 2020

Microsoft warns of Android ransomware that activates when you press the Home button

New MalLocker.B ransomware is currently spreading via online forums and third-party websites
09 October 2020

Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce

Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.
08 October 2020

RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims

RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims Collectively, 240 fraudulent Android apps -- masquerading as retro game emulators -- account for 14 million installs.
08 October 2020

Amid an Embarrassment of Riches, Ransom Gangs Increasingly Outsource Their Work

There's an old adage in information security: "Every company gets penetration tested, whether or not they pay someone for the pleasure." Many organizations that do hire professionals to test their network security posture unfortunately tend to focus on fixing vulnerabilities hackers could use to break in. But judging from the proliferation of help-wanted ads for offensive pentesters in the cybercrime underground, today's attackers have exactly zero trouble gaining that initial intrusion: The real challenge seems to be hiring enough people to help everyone profit from the access already gained.
08 October 2020

Scale Up Threat Hunting to Skill Up Analysts

Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.
08 October 2020

US Seizes Domain Names Used in Iranian Disinformation Campaign

The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.
08 October 2020

Cisco Fixes High-Severity Webex, Security Camera Flaws

Cisco Fixes High-Severity Webex, Security Camera Flaws Three high-severity flaws exist in Cisco's Webex video conferencing system, Cisco’s Video Surveillance 8000 Series IP Cameras and Identity Services Engine.
08 October 2020