{"id":11346,"date":"2018-02-02T07:00:28","date_gmt":"2018-02-02T15:00:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/02\/news-5117\/"},"modified":"2018-02-02T07:00:28","modified_gmt":"2018-02-02T15:00:28","slug":"news-5117","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/02\/news-5117\/","title":{"rendered":"This Week in Security News: Magic Quadrants &amp; Global Threats"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Fri, 02 Feb 2018 14:31:20 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.\u00a0This week, Gartner released its Magic Quadrant Leaders, Data Privacy Day gave us a moment to reflect, and U.K. and U.S. governments alike acted to protect their agencies from vulnerabilities.<\/p>\n<p>Read on to learn more.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trend-micro-named-leader-gartner-magic-quadrant-endpoint-protection-platforms\/\">Trend Micro Named a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms<\/a><\/strong><\/p>\n<p><em>The endpoint security market is quite dynamic right now, with new entrants and ongoing innovation. In the midst of all this market energy, we are pleased to be named a Leader in Gartner\u2019s 2018 Magic Quadrant for Endpoint Protection Platforms.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/data-privacy-age-iot\/\">Data Privacy in the Age of IoT<\/a><\/strong><\/p>\n<p><em>On Data Privacy Day, we should all take a few moments to think about safeguarding our personal data, staying safe online, and improving our privacy habits. But, just what does that mean in the age of IoT?<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/digital-extortion-forward-looking-view\/\">Digital Extortion: A Forward-Looking View<\/a><\/strong><\/p>\n<p><em>In 2017, we saw digital extortion become cybercriminals\u2019 money-making modus operandi. It\u2019s mostly due to ransomware \u2014 cybercriminals\u2019 most popular weapon of choice.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/strava-publishes-heatmap-inadvertently-exposes-military-sites\">Strava Publishes Heatmap, Inadvertently Exposes Military Sites<\/a><\/strong><\/p>\n<p><em>Fitness tracking app Strava published a heatmap of its user activity, composed of a billion activities and 3 trillion latitude\/longitude points. However, it could have also accidentally revealed the hidden locations of U.S. military bases.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/lazarus-group-fancy-bear-most-active-criminal-groups-in-2017\/d\/d-id\/1330954\">Lazarus Group, Fancy Bear Most Active Threat Groups in 2017<\/a><\/strong><\/p>\n<p><em>Lazarus, believed to operate out of North Korea, and Fancy Bear, believed to operate out of Russia, were the most referenced threat actor groups in last year&#8217;s cyberattacks.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.gov.uk\/government\/news\/government-acts-to-protect-essential-services-from-cyber-attack\">Government acts to protect essential services from cyber attack<\/a><\/strong><\/p>\n<p><em>Bosses of Britain\u2019s most critical industries are being warned to boost cybersecurity or face hefty fines for leaving themselves vulnerable to attack, following the UK government\u2019s consultation.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.theverge.com\/2018\/1\/29\/16944326\/microsoft-spectre-processor-bug-emergency-windows-update-reboot-fix\">Microsoft issues emergency Windows update to disable Intel\u2019s buggy Spectre fixes<\/a><\/strong><\/p>\n<p><em>Microsoft has been forced to issue a second out-of-band security update this month to deal with the issues around Intel\u2019s Spectre firmware updates. <\/em><\/p>\n<p><strong><a href=\"http:\/\/money.cnn.com\/2018\/01\/29\/technology\/business\/jackpotting-us-atm-hack\/index.html\">Hackers bring ATM &#8216;jackpotting&#8217; to the U.S.<\/a><\/strong><\/p>\n<p><em>The Secret Service is warning banks about a hacking scheme called &#8220;jackpotting&#8221; that lets someone steal money from ATMs. It&#8217;s the first time this type of scheme has made its way to the United States.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal\/\"><strong>Now that tech runs the world, let\u2019s retire the hacker ideal<\/strong><\/a><\/p>\n<p><em>With Silicon Valley convulsed by revelations of Big Tech\u2019s security failures and social media\u2019s hospitality to bots, trolls, and fraud, the right solution is honest valuations and the application of scientific method. <\/em><\/p>\n<p><strong><a href=\"http:\/\/fortune.com\/2018\/01\/31\/coincheck-hack-how\/\">How to Steal $500 Million in Cryptocurrency<\/a><\/strong><\/p>\n<p><em>In Tokyo, hackers broke into cryptocurrency exchange Coincheck Inc. and made off with nearly $500 million in digital tokens. It\u2019s one of the biggest heists in history.<\/em><\/p>\n<p>What did you think was the biggest story in security this week? Comment below, or you can find me on Twitter: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/week-security-news-magic-quadrants-global-threats\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Fri, 02 Feb 2018 14:31:20 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03-300x205.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/NEW_Security_News_Icon_300x205_03-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.\u00a0This week, Gartner released its Magic Quadrant Leaders, Data Privacy Day gave us a moment to reflect, and U.K. and U.S. governments alike acted to protect their agencies from vulnerabilities&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422],"class_list":["post-11346","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11346"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11346\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11346"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}