MWC 2019: Why 5G + Fortnite = a win-win for criminals
So apparently, the company behind Fortnite has so much cash that it’s forming a $100 million prize fund for upcoming competitions. It’s hardly surprising since its creators, Epic Games, confirmed that by the end of November 2018, 200 million players had registered accounts across PCs, gaming consoles and on mobile. The Android app alone was […] more…Data breaches exposed 5 billion records in 2018
The number of publicly known data breaches decreased last year compared to 2017, despite harsher breach notification rules going into effect in Europe. The number of compromised sensitive records also went down by more than a third, from 7.9 billion records to around 5 billion. [ How much does a data breach cost? Here’s where […] more…Trickbot Adds Remote Application Credential-Grabbing Capabilities to Its Repertoire
by Noel Anthony Llimos and Carl Maverick Pascual In November 2018, we covered a Trickbot variant that came with a password-grabbing module, which allowed it to steal credentials from numerous applications. In January 2019, we saw Trickbot (detected as TrojanSpy.Win32.TRICKBOT.AZ and Trojan.Win32.MERETAM.AD) with new capabilities added to its already extensive bag of tricks. Its authors clearly […] more…Roses Are Red, Violets Are Blue – What Does Your Personal Data Say About You?
A classic meet-cute – the moment where two people, destined to be together, meet for the first time. This rom-com cornerstone is turned on its head by Netflix’s latest bingeable series “You.” For those who have watched, we have learned two things. One, never trust someone who is overly protective of their basement. And two, […] more…How Online Gamers Can Play It Safe
Online gaming has grown exponentially in recent years, and scammers have taken note. With the industry raking in over $100 billion dollars in 2017 alone[1], the opportunity to funnel some money off through fraud or theft has proven irresistible to the bad guys, leaving gamers at greater risk. From malware and phishing scams, to phony […] more…Get TotalAV Essential AntiVirus for $19.99 (80% off)
The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires. And while it’s true that our computers can be infected with literal biological bacteria like staphylococci, per Science Illustrated, the threat of malicious codes […] more…DDoS Attacks in Q4 2018
News overview In Q4 2018, security researchers detected a number of new botnets, which included not only Mirai clones for a change. The fall saw increased activity on the part of the Chalubo bot, whose first attacks were registered in late August. Although the new malware employs snippets of Mirai code and the same persistence […] more…Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy
It’s 2019 and technology is becoming more sophisticated and prevalent than ever. With more technology comes greater connectivity. In fact, by 2020, there will be more than 20 billion internet-connected devices around the world. This equates to more than four devices per person. As we adopt new technology into our everyday lives, it’s important to consider […] more…Going In-depth with Emotet: Multilayer Operating Mechanisms
Over a period of just five years, Emotet has managed to evolve into one of the most notorious cyber threats in existence – one that causes incidents that cost up to $1 million dollars to rectify, according to US-CERT. We recently reported about Emotet’s activities as well as its two infrastructure setups. This follow-up blog […] more…Frequent Fortnite Player? 4 Tips to Combat the New Attack on User Accounts
Epic Games’ Fortnite has risen in popularity rapidly since its debut, and cybercriminals have leveraged that popularity to enact a handful of malicious schemes. Unfortunately, these tricks are showing no signs of slowing, as researchers recently discovered a security flaw that allowed cybercriminals to take over a gamer’s Fortnite account through a malicious link. This attack specifically […] more…New Magecart Attack Delivered Through Compromised Advertising Supply Chain
by Chaoying Liu and Joseph C. Chen On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce websites providing ticketing, touring, and flight booking services as […] more…STOP. Read T&Cs. Then Sign Up on Social Media
“Let’s start at the very beginning, A very good place to start; When you read, you begin with A-B-C, When you sign up on SM you begin by Reading T&Cs…” The start of a new year usually has a buoyant and positive feel, like you have been offered a new opportunity to start things fresh, […] more…The world’s southernmost security conference
When asked about his best race, Ayrton Senna replied that it was when he raced karting cars. For him it was the best because it was only for the sake of sports and free from commercial sponsoring and commercial interests. I have this same feeling about computer security conferences, because they attract people who really […] more…McAfee 2018: Year in Review
2018 was an eventful year for all of us at McAfee. It was full of discovery, innovation, and progress—and we’re thrilled to have seen it all come to fruition. Before we look ahead to what’s in the pipeline for 2019, let’s take a look back at all the progress we’ve made this year and see how McAfee […] more…The #1 Gift Parents Can Give Their Kids This Christmas
You won’t see this gift making the morning shows as being among the top hot gifts of 2018. It won’t make your child’s wish list, and you definitely won’t have to fight through mall crowds to try to find it. Even so, it is one of the most meaningful gifts you can give your child this year. […] more…How to Stay Secure from the Latest Volkswagen Giveaway Scam
You’re scrolling through Facebook and receive a message notification. You open it and see it’s from Volkswagen, claiming that the company will be giving away 20 free vehicles before the end of the year. If you think you’re about to win a new car, think again. This is likely a fake Volkswagen phishing scam, which […] more…More information
- Intel Smart Connect Technology CVE-2019-11167 Local Privilege Escalation Vulnerability
- The NSA is funding a ‘safer’ Internet of Things
- More Than Half of Security Pros Say Risks Higher in Cloud Than On Premise
- Microsoft Edge Scripting Engine CVE-2017-11805 Remote Memory Corruption Vulnerability
- S3 Ep109: How one leaked email password could drain your business [Audio + Transcript]
- 7,000 Fake Indentities Equals 200 Million USD
- Zyxel Devices Can Be Hacked via DNS Requests, Hardcoded Credentials
- Library service interruption, 5/7/2013
- In an effort to generate money, Facebook makes it harder for brands
- Microsoft, Samba Preparing Patch for Severe "Badlock" Flaw