Cybersecurity News
Flaws Found in Some Open Source Projects Exploited More Often
A study of major open source projects finds that 3.3% of vulnerabilities are exploited, but the rate of exploitation varies significantly.05 June 2020
FTC Slams Children’s App Developer for COPPA Violations
Children's app developer HyperBeard must pay $150,000 after the FTC claimed it violated privacy laws.05 June 2020
Electrolux, Others Conned Out of Big Money by BEC Scammer
Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.05 June 2020
News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate
Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.05 June 2020
QNAP NAS devices targeted in another wave of ransomware attacks
eCh0raix ransomware gang returns with a new wave of attacks against QNAP NAS devices.05 June 2020
Name That Toon: Sign of the Tides
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.05 June 2020
WhatsApp Phone Numbers Pop Up in Google Search Results — But is it a Bug?
A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a “privacy issue” for users.05 June 2020
Local, State Governments Face Cybersecurity Crisis
Ransomware hit small government organizations hard in 2019. Now they have to deal with budget cuts, pandemic precautions, social unrest, and the coming election cycle.05 June 2020
The Privacy & Security Outlook for Businesses Post-COVID-19
Long-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.05 June 2020
Week in security with Tony Anscombe
A deep-clean of your Facebook history – Google's Advanced Protection-Nest integration – Talking to your kids before they join social media
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
05 June 2020
How secure is your phone’s lock screen?
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them are more secure than the others?
The post How secure is your phone’s lock screen? appeared first on WeLiveSecurity
05 June 2020
China, Iran, and Russia worked together to call out US hypocrisy on BLM protests
Report from social media research group shows foreign diplomats and state-controlled media pounced on the US' abysmal handling of the BLM protests to attack the US as a beacon of freedom and further their own political goals.04 June 2020
New 'Tycoon' Ransomware Strain Targets Windows, Linux
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.04 June 2020
Tycoon Ransomware Banks on Unusual Image File Tactic
To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.04 June 2020
Trump, Biden Campaign Staffers Targeted By APT Phishing Emails
Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.04 June 2020
Malware Campaign Hides in Resumes and Medical Leave Forms
The campaigns have been part of the overall increase in coronavirus-related malware activity.04 June 2020
Strengthening Secure Information Sharing Through Technology & Standards
How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.04 June 2020
Google: Chinese and Iranian hackers targeted Biden and Trump campaign staffers
Google's TAG team said phishing attacks against Biden and Trump campaign staffers were unsuccessful.04 June 2020
Understanding the Payload-Less Email Attacks Evading Your Security Team
Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.04 June 2020
Zoom Restricts End-to-End Encryption to Paid Users
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.04 June 2020