The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard
In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities […] more…New WannaCry-Mimicking SLocker Abuses QQ Services
by Lorin Wu Trend Micro researchers detected a new SLocker variant that mimics the GUI of the WannaCry crypto-ransomware on the Android platform. Detected as ANDROIDOS_SLOCKER.OPSCB, this new SLocker mobile ransomware variant features new routines that utilize features of the Chinese social network QQ, along with persistent screen-locking capabilities. SLocker, an Android file-encrypting ransomware first […] more…Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
Cybercriminals are opportunists. As other operating systems (OS) are more widely used, they, too, would diversify their targets, tools, and techniques in order to cash in on more victims. That’s the value proposition of malware that can adapt and cross over different platforms. And when combined with a business model that can commercially peddle this […] more…Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane ticket?” Once I plop down in my seat, a terrifying visualization of everything else I may have forgotten flashes across my mind: “Did I turn the lights off in the main hallway?” “Did I set […] more…We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks in the news recently, people have begun to rely on encrypted messaging apps to protect their privacy from potential hackers. These services secure end-to-end connections using varying tactics and levels of encryption – you may find yourself questioning […] more…The 5-Minute Parents’ Guide To Snapchat
OK – we’ve all heard about Snapchat and know that our kids love it. But how many of us really know how it works? Well, read on. I’ve put together a 5-minute overview that will get you up to speed ASAP. So strap yourself in and let’s get hour heads around this together. What Is […] more…What Interests Children Online
Today’s children and teenagers are integrated into cyberspace so tightly that discussions on the outright prohibition of using devices with Internet connectivity are nonsensical. It is more reasonable to teach children how to behave themselves correctly online and lend support by protecting them against undesirable content. To solve these problems, many parents use dedicated software […] more…Why Kids Use Secret Decoy Apps and Why Parents Should Care
Kids have been locking their diaries and hiding top secret shoe boxes since Sandy Olssen had a crush on Danny Zuko. The need for more and more privacy is a natural part of growing up. Today, however, some kids hide their private lives behind locked decoy apps catapulting those harmless secret crushes to a whole […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…WannaCry ransomware used in widespread attacks all over the world
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This exploit (codenamed “EternalBlue”) has been […] more…When phone systems attack
A telephony denial of service (TDoS) attack is a specific type of DDoS attack that originates from or is directed towards a telephone system with the intent of bringing down the targeted system. These attacks commonly focus on commercial businesses and may often include ransomware requests. In reality, these attacks can affect anyone, including our nation’s […] more…App Alert: What Parents Need to Know about Popular New App ‘Yellow’
The Yellow app icon Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little yellow square may look harmless, the app is growing in popularity among teens and already causing concern. Yellow is the new app that’s being called the ‘Tinder for teens,’ because it’s […] more…IoT malware starts showing destructive behavior
Hackers have started adding data-wiping routines to malware that’s designed to infect internet-of-things and other embedded devices. Two attacks observed recently displayed this behavior but likely for different purposes. Researchers from Palo Alto Networks found a new malware program dubbed Amnesia that infects digital video recorders through a year-old vulnerability. Amnesia is a variation of an older […] more…TinyNuke May be a Ticking Time Bomb
On March 12th, 2017 a low-profile developer uploaded to Github a mostly functional Botnet code named TinyNuke. The user, Aainz, uses his real name in connection with this code. It’s not unusual for security professionals or hobbyist to release proof of concept code to enable the industry to learn from the latest techniques and test […] more…Distracted Driving: Is Your Life (or Someone Else’s) Worth that Text?
“We had talked about it and talked about it so many times, but she never thought anything like this would happen to her,” said the mom of 18-year-old Kassie. “She would say she was good enough at texting; that she was fast at it. But it doesn’t take that long—all it takes is a couple […] more…Currency and Performance Drive Multinational Conglomerate’s Migration to McAfee ENS
“Maintaining currency is one of our new driving forces,” says Dwayne Cyr, senior cyber security manager at Textron, a $13.4 billion aerospace, defense, and advanced technologies conglomerate that employs over 35,000 people worldwide. Textron is working diligently to stay ahead of cyber threats as well as provide a more leading-edge experience for its end users. For […] more…More information
- Social predators still gaming the system on Facebook
- How Hackers Bypassed an Adobe Flash Protection Mechanism
- Update: University Collaboration Suite (UCS) Software Upgrade – Thursday, October 22
- Naked Security named most educational blog at RSA 2017 Blogger Awards
- “Hackable?” Dedicates an Entire Episode to “Mr. Robot”
- Job seekers are scrubbing clean their social media accounts
- Blog Comments – Analysing 100,000 Comments and Spammers
- Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat
- In DARPA challenge, smart machines compete to fend off cyberattacks
- Linux Australia breached, personal details leaked