Cybersecurity News
Researchers Fool Biometric Scanners with 3D-Printed Fingerprints
Tests on the fingerprint scanners of Apple, Microsoft, and Samsung devices reveal it's possible to bypass authentication with a cheap 3D printer.08 April 2020
PowerPoint ‘Weakness’ Opens Door to Malicious Mouse-Over Attack
Novel hack allows an attacker to create a mouse-over in a PowerPoint file that triggers the installation of malware.08 April 2020
Microsoft Releases COVID-19 Security Guidance
Information includes tips on how to keep IT systems infection-free.08 April 2020
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
The xHelper Trojan has compromised over 55,000 devices so far, Kaspersky says.08 April 2020
Dark_Nexus Botnet Compromises Thousands of ASUS, D-Link Routers
Researchers say the botnet has emerged over the past three months and shares aspects with Mirai and Qbot.08 April 2020
Microsoft: Under 2% of all daily malspam uses COVID-19 lures
Malicious email campaigns have not increased due to COVID-19. Attackers merely changed lures.08 April 2020
BEC, Domain Jacking Help Criminals Disrupt Cash Transfers
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.08 April 2020
ThreatList: Skype-Themed Apps Hide a Raft of Malware
Hundreds of thousands of malware files are disguised as well-known social conferencing and collaboration apps.08 April 2020
Accenture Buys Revolutionary Security in Third Acquisition of 2020
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.08 April 2020
Top tips for videoconferencing security
ESET Chief Security Evangelist Tony Anscombe shares advice on how to keep your virtual meet-ups private and safe while you're holed up at home during the pandemic
The post Top tips for videoconferencing security appeared first on WeLiveSecurity
08 April 2020
Why Threat Hunting with XDR Matters
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.08 April 2020
Former Facebook CSO Alex Stamos to join Zoom as outside security consultant
Zoom also announces the creation of a CISO Council and Advisory Board to help its CEO through the current security and user privacy-related issues.08 April 2020
WhatsApp Axes COVID-19 Mass Message Forwarding
Amid rampant misinformation, users of the Facebook-owned messaging platform can no longer send coronavirus messages to more than one user at a time.08 April 2020
‘Fake Fingerprints’ Bypass Scanners with 3D Printing
New research used 3D printing technology to bypass fingerprint scanners, and tested it against Apple, Samsung and Microsoft mobile products.08 April 2020
COVID-19 CISO Checklist for Securing a Remote Workforce
The CISO Checklist for Secure Remote Working was built to assist CISOs in navigating through COVID-19, providing them with a concise, high-level list of the absolute essentials needed to ensure their organization is well protected in these challenging times.08 April 2020
Can fingerprint authentication on smartphones be fooled with 3D printing? Researchers find out
Extensive tests of optical, capacitance, and ultrasonic sensors have revealed interesting bypass rates.08 April 2020
This is why the vicious xHelper malware resists factory wipes and reboots
The malware is a prime example of why you should not download apps from third-party sources.08 April 2020
Dark_nexus botnet outstrips other malware with new, potent features
Researchers have found a botnet that borrows from Qbot and Mirai but goes much further in terms of power.08 April 2020
Tails, the security-focused OS, adds support for Secure Boot
Tails, an OS recommended by Edward Snowden, is now capable of booting on systems where UEFI Secure Boot is enabled.08 April 2020