{"id":10307,"date":"2017-11-06T11:10:22","date_gmt":"2017-11-06T19:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/06\/news-4080\/"},"modified":"2017-11-06T11:10:22","modified_gmt":"2017-11-06T19:10:22","slug":"news-4080","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/06\/news-4080\/","title":{"rendered":"A week in security (October 30 \u2013 November 5)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Nov 2017 18:00:03 +0000<\/strong><\/p>\n<p>Last week on our blog, we told you <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/irisscon-security-conference\/\" target=\"_blank\" rel=\"noopener\">what to expect at the upcoming Irisscon security conference in Dublin<\/a>. We gave you a quick introduction into the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/analyzing-malware-by-api-calls\/\" target=\"_blank\" rel=\"noopener\">why and how of analyzing malware based on their API calls<\/a>. And we issued a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/mind-these-digital-crimes-arm-yourself-against-them\/\" target=\"_blank\" rel=\"noopener\">warning about some lesser-known cybercrimes<\/a>. Plus we explained <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/emerging-apac-markets-prime-targets-malware-future\/\" target=\"_blank\" rel=\"noopener\">why emerging APAC markets are prime targets for cybercriminals<\/a>.<\/p>\n<p>We also <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/know-threats-scariest-malware-monsters\/\" target=\"_blank\" rel=\"noopener\">introduced you to some of the scariest malware monsters<\/a> that could come knocking on your door for more than just candy. And finally, we explained\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\" target=\"_blank\" rel=\"noopener\">how cryptocurrencies work and why all the cybercriminals love them<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3235684\/data-breach\/more-data-records-were-lost-or-stolen-in-the-first-half-of-2017-than-all-of-2016.html\" target=\"_blank\" rel=\"noopener\">More data records<\/a> were lost or stolen in the first half of 2017 than in all of 2016. In total, 918 data breaches led to 1.9 billion records being compromised worldwide in the first half of 2017. (source: CSO Online)<\/li>\n<li><a href=\"http:\/\/theartnewspaper.com\/news\/galleries-lose-large-sums-to-cybercrime\" target=\"_blank\" rel=\"noopener\">Galleries hit by cybercrime wave<\/a>. Hackers are using an email scam to intercept payments between galleries, collectors, and others. (source: The Art Newspaper)<\/li>\n<li><a href=\"https:\/\/www.nao.org.uk\/report\/investigation-wannacry-cyber-attack-and-the-nhs\/\" target=\"_blank\" rel=\"noopener\">Investigation: WannaCry cyberattack and the NHS<\/a>. The NAO concluded: \u201cIt was a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice.\u201d (source: National Audit Office)<\/li>\n<li><a href=\"http:\/\/money.cnn.com\/2017\/11\/02\/technology\/donald-trump-twitter\/index.html\" target=\"_blank\" rel=\"noopener\">Twitter: Employee briefly shut down Trump&#8217;s account<\/a> on last day of work. President Trump&#8217;s verified @realDonaldTrump account briefly went offline. (source: CNN tech)<\/li>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/31\/wordpress_security_fix_4_8_3\/\" target=\"_blank\" rel=\"noopener\">WordPress has a security patch out that you should apply ASAP<\/a>. The fix addresses a flaw that can be potentially exploited by hackers to hijack and take over WordPress-powered websites. (source: The Register)<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/critical-tor-flaw-leaks-users-real-ip-address-update-now\/\" target=\"_blank\" rel=\"noopener\">TorMoil vulnerability<\/a>\u00a0This flaw leaks users\u2019 real IP addresses for Mac and Linux versions. (source: Ars Technica)<\/li>\n<li><a href=\"https:\/\/www.id.ee\/index.php?id=30610&amp;read=38341\" target=\"_blank\" rel=\"noopener\">Estonia will block the certificates of 760,000 ID cards<\/a> as of the evening of November 3. (source: ID.ee)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/experts-propose-standard-for-iot-firmware-updates\/\" target=\"_blank\" rel=\"noopener\">Experts propose standard for IoT firmware updates<\/a>. Security experts have recommended and advocated for most of these measures for years. (source Bleeping Computer)<\/li>\n<li>Facebook is running a pilot program in Australia <a href=\"https:\/\/www.scmagazine.com\/facebook-share-your-nudes-to-prevent-revenge-porn\/article\/705177\/\" target=\"_blank\" rel=\"noopener\">asking users to submit their nude pictures<\/a> in a preemptive strike to combat revenge porn. (source: SC Media)<\/li>\n<li>For the second time in as many years, <a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/2nd-breach-at-verticalscope-impacts\/\" target=\"_blank\" rel=\"noopener\">hackers have compromised Verticalscope.com<\/a>. (source: Krebs on Security)<\/li>\n<\/ul>\n<p>Safe surfing, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/a-week-in-security-october-30-november-5\/\">A week in security (October 30 \u2013 November 5)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/a-week-in-security-october-30-november-5\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Nov 2017 18:00:03 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/a-week-in-security-october-30-november-5\/' title='A week in security (October 30 \u2013 November 5)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2014\/09\/photodune-3434769-calendar-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Learn what happened in the world of security during the week of October 30 through November 5. Data breaches, reports, vulnerabilities, and a look at the scariest malware monsters.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apac\/\" rel=\"tag\">apac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime\/\" rel=\"tag\">cybercrime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercriminals\/\" rel=\"tag\">cybercriminals<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/estonia\/\" rel=\"tag\">Estonia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/irisscon\/\" rel=\"tag\">IRISSCON<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tormoil\/\" rel=\"tag\">TorMoil<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/a-week-in-security-october-30-november-5\/' title='A week in security (October 30 \u2013 November 5)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/11\/a-week-in-security-october-30-november-5\/\">A week in security (October 30 \u2013 November 5)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16401,4503,14011,16402,11318,10497,16403,12252,10498],"class_list":["post-10307","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apac","tag-cybercrime","tag-cybercriminals","tag-estonia","tag-irisscon","tag-security-world","tag-tormoil","tag-wannacry","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10307"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10307\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10307"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}