22 Jump Street, Transformers Are Top Movie Lures for Summer
Summertime has become synonymous with blockbuster movies. Unfortunately, these movies have become a go-to social engineering lure used by cybercriminals. Just like in previous years, Trend Micro engineers searched for possible threats related to movies released during the summer. This year, 22 Jump Street was the top movie used for social engineering. Transformers: Age of […] more…Need to Amp Your Internet Safety ‘Street Smarts’?
Okay, let’s just say it: The topic of Internet safety is not exactly glamorous. It rarely makes headlines until after a safety breech rattles your family. Moreover, the topic is loaded with ever-evolving tech terms that can leave your head spinning. Still the fact remains that understanding Internet safety in today’s wired world is just […] more…New Cash Registers Are Sexy, But What’s Beneath the Counter Matters More
Anointed the next Steve Jobs by some admirers, Twitter inventor and Square CEO Jack Dorsey is one of the few people who can get the Silicon Valley press corps to roll out of bed early to hear what he has to say. Unlike Jobs, Dorsey spoke from a table at Blue Bottle Coffee near Square’s […] more…Barking Up The Wrong Tree
Recently, it was announced that such well-known names in the tech industry such as Facebook, Twitter, Microsoft, and Apple had all been affected by a watering hole attack. Employees at all of these affected firms had visited a popular iOS developer forum, which was compromised to serve a then-unknown Java exploit to its users. Unsurprisingly, […] more…Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago, a complete set of Tier 20 armor in World of Warcraft, or a Steam account loaded with your favorite titles. Hackers love it too. Because they can make money off it. Hackers have been stealing […] more…The story of the year: ransomware in the headlines
In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications: The Wall Street Journal, the BBC, the New York Times. It is no longer just being discussed by CISOs and security professionals, but politicians, school administrators, and hospital directors. Words like Babuk and REvil […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new world for children. There are apps, social media, group chats with friends, TikTok stars, and the joy of simply being “in” with their classmates and […] more…Privacy predictions for 2021
2020 saw an unprecedented increase in the importance and value of digital services and infrastructure. From the rise of remote working and the global shift in consumer habits to huge profits booked by internet entertainers, we are witnessing how overwhelmingly important the connected infrastructure has become for the daily functioning of society. What does all […] more…DDoS attacks in Q3 2020
News overview Q3 was relatively calm from a DDoS perspective. There were no headline innovations, although cybercriminals did continue to master techniques and develop malware already familiar to us from the last reporting period. For example, another DDoS botnet joined in the assault on Docker environments. The perpetrators infiltrated the target server, created an infected […] more…Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts
By Marshall Chen, Loseway Lu, Yorkbing Yap, and Fyodor Yarochkin (Trend Micro Research) A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020. The recent campaigns target senior positions in the United […] more…GReAT thoughts: Awesome IDA Pro plugins
The Global Research & Analysis Team here at Kaspersky has a tradition of meeting up once a month and sharing cutting-edge research, interesting techniques and useful tools. We recently took the unprecedented decision to make our internal meetings public for a few months and present them as a series of talks called ‘GReAT Ideas. Powered […] more…A look at the ATM/PoS malware landscape from 2017-2019
From remote administration and jackpotting, to malware sold on the Darknet, attacks against ATMs have a long and storied history. And, much like other areas of cybercrime, attackers only refine and grow their skillset for infecting ATM systems from year-to-year. So what does the ATM landscape look like as of 2020? Let’s take a look. […] more…Data collectors
Who owns data owns the world. And with the Internet taking over much of our daily lives, it has become far easier and faster to receive, collect, and analyze data. The average user cannot even imagine how much data gets collected on them. Besides technical information (for example, about a smartphone) harvested by a manufacturer […] more…3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy
Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives online publically. It’s as if we just can’t help it. Our kids are just so darn cute, right? And, everyone else is doing it, so why not join the fun? One example of this has […] more…4 Fashionable Sweaters for Winter and Mid-season
Warm clothes can be tricky: sometimes they look awesome in a shop but not that good when we try them on. But prevention is better than the cure! That is why we let you know a little bit more about 4 fashionable sweaters that are a must-try for mid-season or winter. Ready? 1. Hoodies and […] more…More information
- Linux Flaw Allows Sudo Users to Gain Root Privileges
- Windows UAC Bypassed Using Event Viewer
- Emergency vBulletin patch fixes dangerous SQL injection vulnerability
- The KickassTorrents Case Could Be Huge
- North Korea-linked Geumseong121 APT group is sending spear-phishing emails to target people interested in North Korean refugees
- Magbo Spam Injection Encoded with hex2bin
- NHS Digital Erroneously Reveals Data of 150,000 Patients
- How Ukraine War Has Shaped US Planning for a China Conflict
- Monster super-critical Patch Tuesday for February 2013
- Fake BlackBerry BBM apps *still* in Google Play Store, one month after failed official release