Facebook Flaws Exposed Friend Lists, Payment Card Data
A researcher last year discovered some information disclosure vulnerabilities in Facebook that exposed users’ friend lists and partial payment card information. The social media giant patched one of the flaws within hours. Web security consultant Josip Franjković had been analyzing the Facebook application for Android when he identified a flaw that allowed him to obtain […] more…GhostTeam Adware can Steal Facebook Credentials
by Kevin Sun (Mobile Threat Analyst) We uncovered a total of 53 apps on Google Play that can steal Facebook accounts and surreptitiously push ads. Many of these apps, which were published as early as April 2017, seemed to have been put out on Google Play in a wave. Detected by Trend Micro as ANDROIDOS_GHOSTTEAM, […] more…Toast Overlay Weaponized to Install Several Android Malware
We uncovered new Android malware that can surreptitiously install other malware on the affected device via the Toast Overlay attack: TOASTAMIGO, detected by Trend Micro as ANDROIDOS_TOASTAMIGO. The malicious apps, one of which had over 500,000 installs as of November 6, 2017, abuses Android’s Accessibility features, enabling them—at least for now—to have ad-clicking, app-installing and […] more…From Cybercrime to Cyberpropaganda
By Daniel Lunghi (Threat Researcher) A couple of common questions that arise whenever cyberpropaganda and hacktivism issues come up: who engages in it? Where do the people acquire the tools, skills, and techniques used? As it turns out, in at least one case, it comes from the traditional world of cybercrime. We’ve come across a case […] more…iCloud Hacking Leak Now Being Used As Social Engineering Lure
With the entire internet abuzz about the iCloud hacking leak – where more than a hundred celebrities had their private photos leaked online- it would certainly only be a matter of time before some enterprising cybercriminal decided that things were ripe for leveraging with socially-engineered threats. And that’s just what happened, as our scanning brought to […] more…Facebook, Google, Yahoo and Microsoft petition US over surveillance requests
Facebook, Google, Yahoo and Microsoft all filed petitions Monday with the Foreign Intelligence Surveillance Court, as part of a renewed effort to reveal more information about government data requests. The companies had already petitioned the U.S. government to let them be more specific in reporting the volume of national security-related requests they receive, following the […] more…BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car and even travels with you on vacation. Your smartphone goes with you everywhere. Although convenient, the unprecedented connectivity we are experiencing culturally with mobile devices can create an equally daunting issue when it comes to […] more…What the NSA doesn’t have: iMessages and FaceTime chats
Since The Guardian began leaking top-secret National Security Agency (NSA) documents just 11 days ago, several tech companies responded to the revelations about the PRISM program. The likes of Google, Facebook, and Apple objected to the tone of the press coverage, saying that any suggestion they’ve ever given a government agency direct access to their […] more…ASK Sucuri: What should I do if my email is in the Yahoo Leak?
We love to get questions from you, our readers, in our Ask Sucuri series. If you have any questions about website malware, blacklisting, or security in general, send us an email to: info@sucuri.net or hit us on Twitter – @sucuri_security. Yesterday we released a blog post about the Yahoo Leak, and created an online tool […] more…How to Protect Yourself From Identity Theft After a Data Breach
Did you just get word that your personal information may have been caught up in a data breach? If so, you can take steps to protect yourself from harm should your info get into the hands of a scammer or thief. How does that information get collected in the first place? We share personal information with […] more…Privacy predictions 2022
We no longer rely on the Internet just for entertainment or chatting with friends. Global connectivity underpins the most basic functions of our society, such as logistics, government services and banking. Consumers connect to businesses via instant messengers and order food delivery instead of going to brick-and-mortar shops, scientific conferences take place on virtual conferencing […] more…Cyberthreats to financial organizations in 2022
First of all, we are going to analyze the forecasts we made at the end of 2020 and see how accurate they were. Then we will go through the key events of 2021 relating to attacks on financial organizations. Finally, we will make some forecasts about financial attacks in 2022. Analysis of forecasts for 2021 […] more…Identity Protection Service: The Best Solution to a Growing Problem
I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren’t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That’s right, the most valuable data on the internet is the data that comprises your identity. Let’s take a look at […] more…Do the Benefits of Bitcoin Outweigh the Risks?
What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving complex mathematical functions. These functions […] more…IT threat evolution Q1 2021. Mobile statistics
The statistics presented here draw on detection verdicts returned by Kaspersky products as provided by users who consented to share statistical data. Quarterly figures According to Kaspersky Security Network, in the first quarter: we detected 1,451,660 mobile installation packages, of which: 25,314 packages were related to mobile banking Trojans, 3,596 packages were mobile ransomware Trojans. […] more…Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is […] more…More information
- Practical IT: How to plan against threats to your business
- NASA prepares for serious sysadmin work – reimaging Opportunity Rover out on MARS!
- Patch Released for Linux Kernel Vulnerability Disclosed at Hacking Contest
- WWDC: What’s new for App Clips in ARKit 5
- ‘Meltdown’ over international cybersecurity agreement
- Turnitin Maintenance Outage Sat., Dec 3 10AM – 1PM
- Megaupload’s Kim Dotcom gets back some of his seized property, and receives right to see evidence against him
- Three Nigerian BEC Fraudsters Extradited From UK to US
- The biggest tech turkeys of 2015
- Intel Patches Serious Vulnerability in Processor Diagnostic Tool