Cybersecurity News
Emotet Malware Rears Its Ugly Head Again
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.21 February 2020
Lawsuit Claims Google Collects Minors’ Locations, Browsing History
A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.21 February 2020
Active Attacks Target Popular Duplicator WordPress Plugin
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.21 February 2020
FBI recommends passphrases over password complexity
Longer passwords, even consisting of simpler words or constructs, are better than short passwords with special characters.21 February 2020
California Man Arrested for Politically Motivated DDoS
The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.21 February 2020
RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes
From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.21 February 2020
Burning Man Tickets for $225? Yep, Too Good to Be True
Scammers are posing as event organizers in a sophisticated fraud effort.21 February 2020
NRC Health Ransomware Attack Prompts Patient Data Concerns
The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed.21 February 2020
Google to put a muzzle on Android apps accessing location data in the background
Google will also update Android's location access permission prompt (again).21 February 2020
Olympics Could Face Disruption from Regional Powers
Destructive attacks and disinformation will likely target the Summer Olympics in Tokyo, two groups of threat experts say.21 February 2020
How to Get CISOs & Boards on the Same Page
These two groups have talked past each other for years, each hobbled by their own tunnel vision and misperceptions.21 February 2020
ObliqueRAT linked to threat group launching attacks against government targets
The new Trojan is attacking organizations across Southeast Asia.21 February 2020
ISS World Hit with Malware Attack that Shuts Down Global Computer Network
The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.21 February 2020
Week in security with Tony Anscombe
Hunting down Linux threats – The implications of DNS encryption for business security – MGM Resorts breach hits millions of people
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
21 February 2020
Security Now Merges With Dark Reading
Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.21 February 2020
Google denies claims that free school Chromebooks are illegally collecting student data
A lawsuit filed in New Mexico alleges the free devices are serving a nefarious purpose -- data collection without parental consent.21 February 2020
Haken Malware Family Infests Google Play Store
Eight apps - mostly camera utilities and children's games - were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.21 February 2020
Up close and personal with Linux malware
What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers.
The post Up close and personal with Linux malware appeared first on WeLiveSecurity
21 February 2020
Digital Inheritance
What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Consider creating some type of digital will, often called a "Digital Inheritance" plan.21 February 2020
DOD DISA discloses data breach
The Defense Information Systems Agency (DISA) handles IT and telecommunications support for the White House and military troops.20 February 2020