KM

8,333 Flips | 1 Magazine | 1 Like | 1 Following | 106 Followers | @KM1a4br | Keep up with KM on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “KM”

Brewery became victim of targeted ransomware attack via job vacancy ad

You may not need a cautionary tale about opening email attachments, but this story is a reminder that you don’t have to be the biggest and most …

Windows is recording every keystroke on devices with handwriting recognition enabled

<b>Facepalm:</b> From the moment you first handwrote or enabled handwriting recognition on your PC, your WaitList.dat file began compiling every text file …

Cyber crooks try to divert direct-deposit paychecks into their accounts, FBI warns

Hackers are now out to reroute the direct deposit of your paycheck into accounts controlled by the cyber crooks.<p>So, take a little extra time to verify that your paycheck hit your bank account. And beware of any official-looking emails related to company surveys, too.<p>According to the latest alert …

Social Issues

Data on Millions from Unwiped Servers Sold Over Craigslist

A shady dealer on Craigslist appears to have been selling access to millions of customer records taken from servers used by a bankrupt electronics …

Auctions

Hacker gets a whopping 14 years in prison for running Scan4You service

Ruslan Bondars run a "VirusTotal-for-crooks" operation from 2009 to 2017.<p>Ruslan Bondars, a 37-year-old man from Latvia was sentenced to a whopping 14 …

Trend Micro

Enterprise IoT Security: Addressing the Challenge in 2019

The primary focus of IoT-driven innovations - as with all technology innovations - is functionality. These devices are proliferating at an …

Administrative Law

Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware

Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.

Information Security

How Can Companies Defend Against Adversarial Machine Learning Attacks in the Age of AI?

The use of AI and machine learning in cybersecurity is on the rise. These technologies can deliver advanced insights that security teams can use to …

Machine Learning

Understanding California's Consumer Privacy Act: The 'American GDPR'

As enterprises around the world deal with legislative backlash following years of unfettered data collection, companies are confused about how to …

Online Privacy

Business Email Compromises Fuel Procurement Fraud

Allan Stojanovic of the University of Toronto on Fraud-Fighting Challenges Nick Holland (@nickster2407) • September 21, 2018<p>Business email …

University of Toronto

Scotland's Arran Brewery Slammed by Dharma Bip Ransomware

Ransomware Crypto-Locked via Domain Controller, Complicating Restoration Mathew J. Schwartz (euroinfosec) • September 21, 2018<p>A Scottish brewery was …

Ransomware

Cybercrime Markets Sell Access to Hacked Sites, Databases

Payment Card Theft, Ransomware Facilitated by Cybercrime-as-a-Service Offerings Mathew J. Schwartz (euroinfosec) • September 21, 2018<p>One mystery with …

Lucy Gang Debuts with Unusual Android MaaS Package

There’s a fresh bloom in the malware-as-a-service garden: Researchers have uncovered a new Russian-speaking threat actor hawking a proprietary …

Cyber-attacks

Unpatched Microsoft Zero-Day in JET Allows Remote Code-Execution

A Microsoft zero-day has been uncovered that could allow remote code-execution; and as of now, it remains unpatched.<p>According to the Zero Day …

Trend Micro

Legitimate RATs Pose Serious Risk to Industrial Systems

<b>Remote administration tools (RATs) installed for legitimate purposes in operational technology (OT) networks can pose a serious security risk,</b> …

Kaspersky Lab

ZDI Shares Details of Microsoft JET Database Zero-Day

<b>Trend Micro's Zero Day Initiative (ZDI) on Thursday made public details on a vulnerability impacting the Microsoft JET Database Engine, although a</b> …

Trend Micro

New Virobot Ransomware and Botnet Emerges

<b>A newly discovered piece of malware combines ransomware and botnet capabilities in a single package, Trend Micro security researchers reveal.</b><p>Dubbed</b> …

Trend Micro

Data Security – Sharing the Responsibility

Does your service provider’s cyber security measures meet the demands of the digital business environment today? Of course, having perimeter defences …

Personal Information

iOS 12 Improves Security, Performance of iPhones, iPads

DAILY VIDEO: Apple iOS 12 isn't flashy but has improved security and performance, and Lenovo and NetApp combine forces in servers and all-flash …

iOS

Cloudflare Launches Security Service for Tor Users

<b>Cloudflare on Thursday announced a new service to provide Tor users with improved security and performance, while also aiming at reducing malicious</b> …

Domain Names

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.<p>The Trump administration has …

Obama Administration

Windows May Be Storing All Your Email and Docs as Unencrypted Plaintext

By on September 21, 2018 at 10:02 am<p>Forensic analyst and data recovery expert Barnaby Skeggs has discovered a troubling design decision in Windows …

Windows 10

Researcher Discloses New Zero-Day Affecting All Versions of Windows

A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system …

Trend Micro

6 Security Training Hacks to Increase Cyber IQ Org-Wide

Move beyond generic, annual security awareness training with these important tips.

Hacking

Cisco releases fixes for remote code execution flaws in Webex Network Recording Player

The bugs could be weaponized to hijack vulnerable software and cause untold damage to victim machines.<p>Cisco has patched a set of severe …

Trend Micro

Cybercrime: 15 Top Threats and Trends

Europol's Internet Threat Report Finds That Older Crimes Remain Alive and Well Mathew J. Schwartz (euroinfosec) • September 19, 2018<p>Criminals …

Social Issues

Data Manipulation: How Security Pros Can Respond to an Emerging Threat

Industry leaders are scrambling to address the issue, which will take new thinking to overcome.<p>This year, the US government paid out its largest bug …

Information Security

Executive Branch Makes Significant Progress As DMARC Deadline Nears

The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.

Information Security

When Will GDPR Show Its Teeth?

The latest edition of the ISMG Security Report takes a look at the EU's General Data Protection Regulation, including the outlook for enforcement and …

GDPR

New ransomware can turn your computer into a hacker's tool

This new malware isn't letting any part of an infected computer go to waste.<p>The Virobot ransomware -- spotted on Sept. 17 by Trend Micro researchers -- doesn't just lock up infected computers, it also enlists them as part of its massive botnet.<p>Ransomware is a prevalent tool for cybercriminals, …

Trend Micro