What are deepfakes? How and why they work
Deepfakes are fake videos or audio recordings that look and sound just like the real thing. Once the bailiwick of Hollywood special effects studios and intelligence agencies producing propaganda, like the CIA or GCHQ’s JTRIG directorate, today anyone can download deepfake software and create convincing fake videos in their spare time. [ Keep up with […] more…Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators. It targets organizations in Japan, South Korea, and Taiwan, leveling its attacks on public sector agencies and telecommunications and other high-technology industries. In 2016, for instance, we found their […] more…The return of Fantomas, or how we deciphered Cryakl
In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys to our experts, who used them to update the free RakhniDecryptor tool for recovering files encrypted by the malware. The ransomware, which for years had raged across Russia (and elsewhere through […] more…Time to Take a Good, Hard Look at Your Cybersecurity Health
What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting. Just this month, two major situations were revealed. A Florida marketing firm, Exactis, had their database […] more…Duty of care: Why (and how) law firms should up their security game
June 17, 1972, changed the legal profession forever. The Watergate break-in, and subsequent coverup, implicated more than a dozen lawyers working for the White House or the Committee for the Re-election of the President (CREEP). The scandal led to calls to regulate the legal profession, and today ethics is a mandatory part of law school […] more…Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s passion for playing video games. He loved them, and I let him. I convinced myself that my son’s video gaming provided him with an instant community where he daily climbed to the top of the […] more…Attention Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their personal and professional lives. One of the most popular email services out there today is Google’s offering, Gmail, which has 1.4 billion users. Many people use the platform daily, even connecting it to third-party apps […] more…CHEW on This: How Our Digital Lives Create Real World Risks
Adults today have witnessed video stores becoming streaming services, book stores vanishing into cyberspace. Traditional, even beloved, consumer brands are being supplanted by digital replacements. Even interpersonal relationships now occur largely online. read more more…‘McAfee Labs Threats Report’ Spotlights Innovative Attack Techniques, Cryptocurrency Mining, Multisector Attacks
In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of this year. We have observed that although overall new malware has declined by 31% since the previous quarter, bad actors are working relentlessly to […] more…Checking In Halfway: The McAfee Labs 2018 Threats Predictions
Time flies when you’re fighting cybercrime. Now that’s not exactly how the phrase goes, but for us at McAfee, it’s hard to believe that we’re already almost halfway through 2018. It seems like just yesterday we were predicting the types of cyberthreats we would see throughout this year with our McAfee Labs 2018 Threats Predictions […] more…Supreme Court: Your digital location is protected by the Constitution
The U.S. Supreme Court today ruled that access to historical cell-site records of a person’s location based on their mobile phone will require law enforcement to obtain a warrant before searching a person’s historical location records. This is the first time the high court has ruled on whether a phone subscriber has a legitimate expectation […] more…NanoLock Launches Platform to Protect IoT Devices From Production Through End-of-Life
Cybersecurity start-up NanoLock Security today announced a new lightweight security platform designed to add security into the small connected devices better known as the internet of things, rather than to overlay security around those devices. read more more…Modern OSs for embedded systems
At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other words, the internet of things). Our primary interest is how and to what degree these OSs can solve cybersecurity-related issues. We’d like to point out […] more…Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the town. However, what most don’t realize is that a there is a sophisticated technology involved in each cryptocurrency transaction designed to secure digital currency: blockchain technology. Now, many of you may be asking – what […] more…North American Malware Trends: Taking a Proactive Approach to Modern Threats
by Jennifer Hernandez, Anjali Patil and Jay Yaneza (Trend Micro Cyber Safety Solutions Team) The IT teams of medium and large businesses are expected to protect their networks from high-risk enterprise threats. At the same time, they are also expected to concentrate on their main role, which is managing the day-to-day IT operations of their companies. […] more…Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and the thousands of other cars headed south on Interstate 4 — offers a reflection of family life today. Mom has her earbuds on and is listening to her newest audiobook, Dad is nodding along with […] more…More information
- Update: EIO Infrastructure outage
- Hacker claims credit for DNC breach, posts files online
- Phishing Scam Targets Walmart.com Online Customers
- Torq Secures $70M Series C for HyperSOC
- 0-day exploits more than double as attackers prevail in security arms race
- Anonymous: We Have Access to Every Secret Government Database
- Phantom Ships Expose Weakness in Vessel-Tracking System
- Samsung chief avoids arrest in South Korean corruption scandal
- Adobe’s final patch update this year: 78 bugs squashed
- POWELIKS Levels Up With New Autostart Mechanism