Cybersecurity News
Researchers Adapt AI With Aim to Identify Anonymous Authors
At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.02 October 2020
Biometric Data Collection Demands Scrutiny of Privacy Law
An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.02 October 2020
Voter Registration ‘Error’ Phish Hits During U.S. Election Frenzy

02 October 2020
'Father of Identity Theft' Sentenced to 207 Months
James Jackson was convicted of mail fraud, aggravated identity theft, access device fraud, and theft of mail last year.02 October 2020
Account Takeover Fraud Losses Total Billions Across Online Retailers

02 October 2020
Attacks Aimed at Disrupting the Trickbot Botnet
Over the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot, an enormous collection of more than two million malware-infected Windows PCs that are constantly being harvested for financial data and are often used as the entry point for deploying ransomware within compromised organizations.02 October 2020
Researchers Mixed on Sanctions for Ransomware Negotiators

02 October 2020
Emotet Spoofs DNC In New Attack Campaign
Thousands of Emotet emails contain a message body pulled directly from the Democratic National Committee website, researchers report.02 October 2020
Google is creating a special Android security team to find bugs in sensitive apps
Android apps that will be on the team's radar include COVID-19 contact tracing apps and election-related apps.02 October 2020
LatAm Banking Trojans Collaborate in Never-Before-Seen Effort

02 October 2020
Name That Toon: Castle in the Sky

02 October 2020
Week in security with Tony Anscombe
ESET research unearths a previously unknown espionage gang and a new version of Android spyware - Elucidating connections between Latin American banking trojans
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
02 October 2020
Years-Long ‘SilentFade’ Attack Drained Facebook Victims of $4M

02 October 2020
Google sets up research grant for finding bugs in browser JavaScript engines
Eligible browser JavaScript engines include JavaScriptCore (Safari), V8 (Chrome, Edge), and Spidermonkey (Firefox).02 October 2020
3 Months for the Cybercrime Books

02 October 2020
3 Months for the Cybercrime Books

02 October 2020
305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer

02 October 2020
Truncated URLs Look to Make Big Dent in Phishing
The approach is a long time in coming and will test the premise that users can more easily detect a suspicious domain from the name alone.02 October 2020
Researchers track hacking ‘fingerprints,’ link Russian attackers to Windows exploit sellers
The new technique was used to profile prolific Windows LPE exploit sellers.02 October 2020
ESET discovers a rare APT that stayed undetected for nine years
Active since 2011 but only discovered this year, the XDSpy hacker group targeted government and private companies in Belarus, Moldova, Russia, Serbia, and Ukraine.02 October 2020