How to Build Your 5G Preparedness Toolkit

5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year or so. This isn’t surprising considering the potential benefits this new type of network will provide to organizations and users alike. However, just like with any new technological advancement, there are a lot of questions […] more…

DLL Hijacking Flaws Patched in Trend Micro Password Manager

Trend Micro recently patched a couple of DLL hijacking vulnerabilities in Password Manager that could allow malicious actors to escalate privileges, make their malware persistent, and to load and execute their payloads via a signed service. read more more…

Router guest networks lack adequate security, experts say

While many organizations and home networks use a host and guest network on the same router hardware to increase security, a new study indicates that routers from well-known manufacturers are vulnerable to cross-router data leaks through a malicious attack on one of the two separated networks. more…

Analysis: New Remcos RAT Arrives Via Phishing Email

By Aliakbar Zahravi (Malware Researcher) In July, we came across a phishing email purporting to be a new order notification, which contains a malicious attachment that leads to the remote access tool Remcos RAT (detected by Trend Micro as BKDR_SOCMER.SM). This attack delivers Remcos using an AutoIt wrapper that incorporates various obfuscation and anti-debugging techniques […] more…

Focus on Use Cases to Improve Security Operations

There was a time when the term “use case” was confined to product development meetings where software and systems engineers worked through defining why and how a product would be used in order to create requirements. Use cases remain a critical tool to ensure teams are building products their customers need and can use.  read […] more…

‘NULL’ license plate gets security researcher $12K in tickets

The vanity plate sounded good in theory: maybe it would make his plate invisible to ALPR systems?! more…

Hacking forum spills rival’s 321,000 member database

When users of hacking forums turn on each other, expect things to get messy quickly. more…

Facebook got humans to listen in on some Messenger voice chats

Facebook says it’s paused the practice of collecting voice clips and sending them to employees to transcribe and analyze. more…

Chrome, Firefox to expunge Extended Validation cert signals

Google and Mozilla have decided to eliminate visual signals in their Chrome and Firefox desktop browsers of special digital certificates meant to assure users that they landed at a legitimate site, not a malicious copycat. The certificates, dubbed “Extended Validation” (EV) certificates, were a subset of the usual certificates used to encrypt browser-to-server-and-back communications. Unlike […] more…

Owners of Fake Tech Company Plead Guilty to Fraud Charges

Two Florida men have pleaded guilty to wire fraud charges filed in southern Illinois, where they targeted people with fake technical support services. Michael Austin Seward of Deerfield Beach and Kevin James McCormick of Delray Beach admitted Wednesday they operated a scam called Client Care Experts. read more more…

Feds: Capital One Suspect May Have Hacked 30-Plus Companies

Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. read more more…

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft has identified and patched several vulnerabilities in the Windows Remote Desktop Services (RDS) component — formerly known as Terminal Services — which is widely used in corporate environments to remotely manage Windows machines. Some of the vulnerabilities can be exploited without authentication to achieve remote code execution and full system compromise, making them highly […] more…

New Bluetooth Vulnerability Allows Attackers to Intercept Traffic

A KNOB (key negotiation of Bluetooth) attack against the basic rate/enhanced data rate (BR/EDR, or Bluetooth Classic) configuration can result in information disclosure and/or escalation of privileges. read more more…

SAP Patches Highest Number of Critical Flaws Since 2014

SAP’s Security Patch Day updates for August 2019 address three new critical vulnerabilities affecting the company’s products. This is the highest number of critical flaws fixed on the same day since 2014. read more more…

British Airways Criticized for Exposing Passenger Flight Details

British Airways (BA) has been criticized for allowing hackers easy access to customer flight information. The issue was exposed Tuesday by researchers who discovered “a vulnerability affecting British Airways’ e-ticketing system that exposes passengers’ personally identifiable information (PII).” read more more…

Attackers could be listening to what you type

You likely know to avoid suspicious emails to keep hackers from gleaning personal information from your computer. But a new study suggests that it’s possible to access your information in a much subtler way: by using a nearby smart phone to intercept the sound of your typing. more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News