Yara Used to RickRoll Security Researchers
For most security researchers, Yara, a tool that allows them to create their own set of rules for malware tracking, is an invaluable resource that helps automate many processes. However, despite Yara’s reliability, it shouldn’t be the only tool used to monitor new versions of malware. This article will show why. There are many resources […] more…Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our kid’s online activity? That’s the rhetorical question most parents carry around unspoken. With all the to-dos of parenting, isn’t there a shortcut on all that social media stuff we don’t have to bookmark or save […] more…WannaCry ransomware used in widespread attacks all over the world
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This exploit (codenamed “EternalBlue”) has been […] more…Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras
By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that caused some of the most […] more…Wired and Tired: 6 Ways to Restore What Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers sheepishly approached in search of wisdom. But reality and time — especially in parenting — become the great equalizers, yes? Even though my kids are now 16 and 22, I more closely resemble a Yo-Yo than the ever-wise […] more…Wired and Tired: 6 Simple Ways to Restore the Things Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers looked to me for wisdom. But even though my kids are now 16 and 22, it’s confusion, not clarity that invades my decision making. And that whole Yoda thing? Yeah — never gonna happen. Raising kids of any age […] more…Court to force adult site to expose ‘pirating’ users
A porn company has found more than 1,000 copyright-infringing videos on Pornhub. Fair. But why isn’t Pornhub itself being held accountable? more…App Alert: What Parents Need to Know about Popular New App ‘Yellow’
The Yellow app icon Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little yellow square may look harmless, the app is growing in popularity among teens and already causing concern. Yellow is the new app that’s being called the ‘Tinder for teens,’ because it’s […] more…Unraveling the Lamberts Toolkit
Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […] more…Distracted Driving: Is Your Life (or Someone Else’s) Worth that Text?
“We had talked about it and talked about it so many times, but she never thought anything like this would happen to her,” said the mom of 18-year-old Kassie. “She would say she was good enough at texting; that she was fast at it. But it doesn’t take that long—all it takes is a couple […] more…Trust Under Fire: How to Help Your Kids Understand Trust in a Digital World
Just about everything comes down to trust, especially in a hyper-connected, share-happy digital culture. We pay strangers to Uber us, we Airbnb our vacations, we eBay our purchases, Venmo money to friends, and eHarmony our soul mates. It’s efficient, brilliant, and dicey all at the same time. This social landscape presents parents with a mound […] more…Picture Perfect: How to Help Your Teen Survive an ‘Instagram-Ready’ World
As the mom of a teenage girl, I have a front row seat to the good, the bad, and the mind-blowing ways social media influences teens. The struggle to fit in with peers that every teen generation is tasked to navigate has only proliferated with technology. Now it’s not just presenting your best self at […] more…Spam and phishing in 2016
The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than in 2015. 62.16% of spam emails were no more than 2 KB in size. 12.08% of spam was sent from the US. Trojan.Win32.Bayrob was the most popular malware family […] more…Breaking The Weakest Link Of The Strongest Chain
Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the […] more…7 Ways to Boost the Love and Balance the Tech in Your Family
What if the most valuable gift you could give your sweetheart — or your family — cost you absolutely nothing? What if Valentine’s Day was less about candy and teddy bears and more about giving your undivided attention (minus your device) to the people in front of you? When it comes to technology use, our […] more…Parent Alert: Could Your Child be Plagiarizing Homework?
“Borrowed thoughts, like borrowed money, only show the poverty of the borrower.” ~Lady Marguerite Blessington Most of us would gasp if we received a call that our child cheated on his or her Algebra test by looking at another student’s paper. But did you know there’s another form of cheating going on in schools today […] more…More information
- GamerGate troll turns tail after receiving harassment of his own
- Microsoft targets skills gap with new AI-powered Skills in Viva
- Update: Central Person Registry (CPR) Infrastructure Security Patching
- Lynda.com is Unavailable
- White House Begins To Realize It May Have Made A Huge Mistake In Going After Apple Over iPhone Encryption
- Another Chrome zero-day exploit – so get that update done!
- Atlassian Patches High-Severity Vulnerabilities in Confluence, Crucible, Jira
- Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability
- How the NIST cybersecurity framework can help secure the enterprise
- Rumored 12-inch MacBook Air with Retina display to launch in Q2, report says