How Much Control Do You Really Have Over Your Family’s Connected Life?
If you took an inventory of your family’s connected devices, would you have three or four devices, or would it be more like 30? You might be surprised how connected your family has become. The gradual, gadget creep is real, as are the security risks that come with it. While the smart products we purchase — […] more…In Review: 2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope
65 million: the number of times we’ve blocked mobile threats in 2016. By December 2016, the total number of unique samples of malicious Android apps we’ve collected and analyzed hit the 19.2 million mark—a huge leap from the 10.7 million samples collected in 2015. Indeed, the ubiquity of mobile devices among individual users and organizations, […] more…7 Simple Ways to Minimize Risk to Your Family’s Privacy Online
If there is an upside to the torrent of headlines about fake news, intelligence leaks, and email hacking surrounding this year’s U.S. election cycle, it’s this: People may be personalizing cyber threats more than ever. The upside of fake news? Let’s be honest. Most consumers online easily zip past digital safety headlines and opt for clicks […] more…Like Jessica Alba? Don’t click Facebook links promising nude photos of her – or anyone else
It’s an old scam that never goes away: this latest version is a rogue Chrome plugin that promises nude videos of Alba and other celebrities but leaves your device hobbled more…Don’t be a security turkey this Thanksgiving!
Here’s a plain-talking video to help you stay secure this weekend…and on into the New Year. more…Spam and phishing in Q3 2016
Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter, this figure once again increased significantly. According to KSN data, in Q3 2016 the number of email antivirus detections totaled 73,066,751. Most malicious attachments contained Trojan downloaders that […] more…How to Get Smarter About Phones and Homework Time
But Moooooom, you can’t take my phone! I can’t finish my homework without it! In that desperate moment, my daughter looked more like an extra on the set of Les Miserables pleading for bread than a 16-year-old studying Algebra polynomials. No exaggeration; the panic was at DEFCON level. Remember when all you needed to get your homework […] more…Teaching Kids to Secure Their Data & Hearts Online
Valentine’s week is filled with flowers, chocolate . . . and that wonderfully dangerous little thing called oxytocin. Referred to as the “trust hormone,” oxytocin is one of several chemicals our brains release when we feel attracted to someone. Fun right? Yes, but it can also function pretty much like an opiate and cause feelings […] more…CryPy: ransomware behind Israeli lines
A Tweet posted recently by AVG researcher, Jakub Kroustek, suggested that a new ransomware, written entirely in Python, had been found in the wild, joining the emerging trend for Pysomwares such as the latest HolyCrypt, Fs0ciety Locker and others. This Python executable comprises two main files. One is called boot_common.py and the other encryptor.py. The […] more…DressCode and its Potential Impact for Enterprises
Threats to mobile users have grown quickly in the span of only a few months. Trend Micro’s Mobile App Reputation Service (MARS) has counted 16.6 million malware detections as of August 2016, a 40% leap from detections listed in January. The Android platform continues to be particularly susceptible, with one specific malware family called “DressCode” steadily […] more…Are Snap(chat)’s Spectacles the new Google Glass?
The newly renamed “Snap” is getting into the hardware (and, some say, surveillance) business by gluing a video camera onto sunglasses. more…Instagram users to take control over abusive comments
The photo and video app now allows users to control and filter comments to thwart online nastiness. more…Future iPhones might grab a thief’s photo and fingerprint when stolen
A device would snap a photo of (what the device assumes may be) a thief, capture their fingerprint, shoot some video and/or record audio. more…Feds move to stop social media mockery of nursing home residents
Workers sharing degrading/intimate/nonconsensual photos and videos may mean facilities get fined, written up or cut from Medicare. more…Shade: not by encryption alone
Malefactors continue to expand the features of ransomware as they try to extract maximum benefit from the compromise of infected computers. We recently found an interesting example of such an “upgrade”: a new logic in the latest version of the Shade encryptor currently being spread widely within the territories of Russia and CIS. On the […] more…Windows 10: What’s New in the Security System
Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target the Windows platform by developing numerous security technologies that were previously available only in third-party solutions. The system has become better protected, making the life of cybercriminals […] more…More information
- CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation
- United launches bug bounty, but in-flight systems off limits
- Security Camera Feeds Exposed Due to Flaw in SDK Used by Many Vendors
- Resolved: UPS Battery replacement at USB2
- Macro Malware Has Returned: Intel Security
- TLT Releases New LAT Website
- Everything You Need to Know About Amazon’s New Fire Phone
- Apple, betrayed by its own law firm
- Microsoft Windows DLL Loading CVE-2017-11769 Multiple Local Privilege Escalation Vulnerabilities
- Cracking the Cloud: The Persistent Threat of Credential-Based Attacks