Microsoft sets IE’s date with death — kind of
Microsoft has spelled out its plans to retire the venerable Internet Explorer 11 (IE11) browser from widespread use in a little over a year. “The future of Internet Explorer on Windows 10 is in Microsoft Edge,” asserted Sean Lyndersay, an Edge program manager, asserted in a May 19 post to a company blog. “With Microsoft […] more…Evolution of JSWorm ransomware
Introduction Over the past few years, the ransomware threat landscape has been gradually changing. We have been witness to a paradigm shift. From the massive outbreaks of 2017, such as WannaCry, NotPetya, and Bad Rabbit, a lot of ransomware actors have moved to the covert but highly profitable tactic of “big-game hunting”. News of ransomware […] more…Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips to designated accounts. However, online users and security experts are already exposing the vulnerabilities in its architecture. Twitter’s Tip Jar has sparked concerns over user privacy due […] more…An antidote to boring e-commerce
Visit the website of the clothing retailer Entireworld, and you might think your browser is broken. A patchwork of square images hovers in space over a mostly white background. Pictures scroll on top of a sparse navigation pane set awkwardly to the side. New-age music reminiscent of whale songs plays in the background. It’s disconcerting, […] more…With smart canvas, Google looks to better connect Workspace apps
Google is adding a range of “smart canvas” features to its Workspace productivity software suite, offering news ways to connect and share contextual information between apps such as Docs and Sheets. Rather than introducing entirely new products, the Workspace smart canvas features are pitched as a “new product experience” that updates existing apps with improved […] more…Lawmakers Reintroduce ‘Pipeline Security Act’ Following Colonial Hack
More than a dozen U.S. lawmakers led by Rep. Emanuel Cleaver (D-MO) have reintroduced the Pipeline Security Act, whose goal is to aid the DHS’s efforts to protect pipeline infrastructure against cyberattacks, terrorist attacks and other threats. read more more…Social engineering, fake App Stores, hit iOS, Sophos warns
I didn’t entirely mean to focus on Apple device security for most of this week (see here and here), but new Sophos research should interest any enterprise working to enhance security awareness. Breaking bad The research looks at 167 counterfeit apps used to scam iOS and Android users. Those that impact Apple’s mobile OS particularly […] more…Ransomware world in 2021: who, how and why
As the world marks the second Anti-Ransomware Day, there’s no way to deny it: ransomware has become the buzzword in the security community. And not without good reason. The threat may have been around a long time, but it’s changed. Year after year, the attackers have grown bolder, methodologies have been refined and, of course, […] more…Context is king (part I) – Crowdsourced Sigma rules
In our previous blog post we started discussing how important it is to have relevant context when doing any investigation and how at VirusTotal, we are working hard to provide as much context as possible. Indeed, there are many new features we have already implemented and that we want to share with all of you. […] more…DDoS attacks in Q1 2021
News overview Q1 2021 saw the appearance of two new botnets. News broke in January of the FreakOut malware, which attacks Linux devices. Cybercriminals exploited several critical vulnerabilities in programs installed on victim devices, including the newly discovered CVE-2021-3007. Botnet operators use infected devices to carry out DDoS attacks or mine cryptocurrency. Another active bot […] more…PC Gamers (and Parents of Gamers) Rejoice!
Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them. After all, gaming offers excitement, new experiences, and social interaction, all from the comfort of home. It’s no wonder then that the gaming industry saw a 20% increase in revenue in 2020, as new and previously-retired […] more…Digital Estate Planning – What to Do With Your Digital Assets
While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles, eBay stores, photos, online games, and more—there will come a time we should ask ourselves, What happens to all of this good stuff when I die? Like anything else we own, those things can be passed along through our estates […] more…Targeted Malware Reverse Engineering Workshop follow-up. Part 2
If you have read our previous blogpost “Targeted Malware Reverse Engineering Workshop follow-up. Part 1“, you probably know about the webinar we conducted on April 8, 2021, with Kaspersky GReAT’s Ivan Kwiatkowski and Denis Legezo, to share best practices in reverse engineering and demonstrate real-time analysis of recent targeted malware samples. The experts also had […] more…Why Coin Miners Go Bad & How to Protect Your Tech When They Do
Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is making coin mining an appealing hobby or even a whole new career. Coin mining software is the main tool in a prospector’s belt. Some coin miners, also known as cryptocurrency miners, are tempted by the dark side of the industry and resort to nefarious means to […] more…The best Android apps for organizing your life
Most of us juggle an immense amount of information these days — enough tasks, to-do’s, and scattered scraps of mental data to fill up a 40-gallon fish tank. (Just imagine all those tiny little thought-fishies swimming around! Glub, glub, glub.) But guess what? Your tired ol’ noggin isn’t the only tool for keeping track of […] more…Prioritizing Security in a Remote Learning Environment
Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions deploy new technology to facilitate a safe and effective remote learning environment, their cyber vulnerabilities also increase. Canadian schools especially have seen a rise in ransomware attacks with the transition to online learning, opening the […] more…More information
- Why your company needs both a CIO and a CISO
- Critical Flaws in Abode Home Security Kit Allow Hackers to Hijack, Disable Cameras
- U.S. security vendors wary of Chinese telecom suppliers, call for transparency
- AMTSO Publishes Guidance for Testing IoT Security Products
- In Other News: Ex-NSA Employee Spying for Russia, EU Threat Landscape, Cyber Education Funding
- Patelco Credit Union Scrambling to Restore Systems Following Ransomware Attack
- Researcher ‘gobsmacked’ by data breach exposing 35,000 Indian patients
- Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking
- Leak of 4,000 Facebook documents heaps more trouble on internet giant
- RIM considers split, handset unit sell-off: Palm ‘Groundhog Day?’