Raise a United Voice Against Cyberbullying: Stop Cyberbullying Day
What does Zoe Saldana have in common with Sonam Kapoor, other than the fact that they are both renowned actors? They have both faced bullying online. And due to the anonymity and sense of security offered by the internet, not just celebs but even ordinary people like you and I could be subjected to cyberbullying. […] more…Preparing for GDPR in 2017, Part 4: Your SOC
This is the fourth in a series of blog posts designed to help enterprise security and business executives prepare for GDPR throughout 2017. One of the key requirements under the new General Data Protection Regulation is breach reporting. Of course, to report a breach implies you have the capability to detect a data breach – […] more…Is WannaCry Really Ransomware?
This post summarizes the significant efforts of a McAfee threat research team that has been relentless in its efforts to gain a deeper understanding of the WannaCry ransomware. We would like to specifically acknowledge Christiaan Beek, Lynda Grindstaff, Steve Grobman, Charles McFarland, and Kunal Mehta for their efforts. Ransomware follows a relatively simple model: data […] more…The Reigning King of IP Camera Botnets and its Challengers
By Kenney Lu, Tim Yeh and Dove Chiu (Threats Analysts) Early this month we discussed a new Internet of Things (IoT) botnet called Persirai (detected by Trend Micro as ELF_PERSIRAI.A), which targets over 1000 Internet Protocol (IP) camera models. Currently, through Shodan and our own research, we see that 64% of tracked IP cameras with […] more…Curbing The Threat Of Fake Accounts
My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was literally hopping around the room, squealing in delight. As a parent and my daughter’s cybersafety guide, I checked her page to confirm and what I saw made me sad but I had to burst her […] more…Red on Red: The Attack Landscape of the Dark Web
We’ve frequently talked about how limited-access networks such as the Dark Web is home to various cybercriminal underground hotspots. Hosted and accessed via the Tor network, these sites house underground marketplaces that sell various good and services, which include cryptocurrency laundering, hosting platforms for malware, and stolen/counterfeit identities. My colleagues have already published plenty of material […] more…How ‘smart cities’ push IoT cybersecurity for state and local IT
In the last installment of this column, we talked about cyber hygiene as a way to reduce security vulnerability. Now let’s turn our focus to cybersecurity, particularly as government gears up for the coming rush of the internet of things (IoT). The threat recently became more real for state and local leaders. This past April, […] more…IT threat evolution Q1 2017. Statistics
Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…Massive WannaCry/Wcry Ransomware Attack Hits Various Countries
Earlier this year, two separate security risks were brought to light: CVE-2017-0144, a vulnerability in the SMB Server that could allow remote code execution that was fixed in March, and WannaCry/Wcry, a relatively new ransomware family that spread via Dropbox URLs in late April. These two threats have now been combined, resulting in one of the most […] more…WannaCry ransomware used in widespread attacks all over the world
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This exploit (codenamed “EternalBlue”) has been […] more…Email, email, in the cloud
As my company continues to move enterprise applications to the cloud, the latest development presents a security opportunity. We are giving up our on-premises Microsoft Exchange email in favor of the Microsoft Office 365 service. With the transition, we might be able to curtail the common employee practice of communicating and storing sensitive business-related data […] more…False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results
In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Indeed, this is a very inconvenient matter that some developers tend to overlook (or try to solve with questionable methods) until there is a serious incident that could paralyze the work […] more…What Else Kids Give Away When They Share Passwords
Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t so wise — their passwords. Password sharing has become a symbol of trust between friends and a sign of intimacy between significant others so much so that most teens aspire to password sharing as “relationship […] more…Instagram Has Hopped Aboard the Two-Factor Authentication Train
With over 500 million users, Instagram has quickly become one of the top dogs of social media. Between the many features that combine the best of Facebook and Snapchat and a gorgeous, visual interface that lets you share your thoughts in over 140 characters, I understand why so many people are turning to the platform […] more…It’s World Password Day but passwords may be headed for extinction
Today is World Password Day but a range of alternative authentication methods is challenging passwords so that within the foreseeable future the day of awareness could become obsolete. Biometrics and cell phones are important to this replacement, with ongoing trials of how effective they might be. There is a flurry of activity in these areas […] more…More information
- Best Data Recovery
- Police can demand fingerprints but not passcodes to unlock phones, rules judge
- Resolved: GI Interface Experiencing Sporadic Outages
- Massive Malvertising Campaigns Hit Sites Worldwide
- Philips IntelliBridge EC40 and EC80 CVE-2019-18241 Unauthorized Access Vulnerability
- Barrett Brown, former Anonymous spokesman, arrested in Dallas, in FBI custody
- 14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
- ANGEL maintenance window changes begin August 13
- U.S. Government Details ELECTRICFISH Malware Used by North Korea
- Microsoft Windows CVE-2019-1322 Local Privilege Escalation Vulnerability