{"id":11853,"date":"2018-03-26T10:10:02","date_gmt":"2018-03-26T18:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/26\/news-5622\/"},"modified":"2018-03-26T10:10:02","modified_gmt":"2018-03-26T18:10:02","slug":"news-5622","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/03\/26\/news-5622\/","title":{"rendered":"A week in security (March 19 \u2013 March 25)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 26 Mar 2018 17:00:07 +0000<\/strong><\/p>\n<p>Last week, we looked at the growing problem of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/investors-raise-concerns-about-smartphone-addiction-apple-responds-with-families-page\/\" target=\"_blank\" rel=\"noopener\">smartphone addiction<\/a>, how <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/the-digital-entropy-of-death-link-rot\/\" target=\"_blank\" rel=\"noopener\">link rot<\/a> is continually slicing down portions of the web, and the <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/03\/cyberbyte-steals-malwarebytes-intellectual-property\/\" target=\"_blank\" rel=\"noopener\">theft of our intellectual property<\/a>. We also explored the landscape of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/03\/ddos-attacks-are-growing-what-can-businesses-do\/\" target=\"_blank\" rel=\"noopener\">DDoS problems<\/a>, and tackled a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/03\/celebrating-stephen-hawking-with-a-419-scam\/\" target=\"_blank\" rel=\"noopener\">Stephen Hawking 419 scam<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>What can only really be described as &#8220;<a href=\"https:\/\/www.theregister.co.uk\/2018\/03\/22\/ftc_scam_scammers_scamming_scammed_in_scam_scam\/\" target=\"_blank\" rel=\"noopener\">Scamception<\/a>&#8221; (source: The Register)<\/li>\n<li>Mozilla <a href=\"https:\/\/blog.mozilla.org\/blog\/2018\/03\/21\/mozilla-presses-pause-facebook-advertising\/\" target=\"_blank\" rel=\"noopener\">calls time on Facebook advertising<\/a> (source: Mozilla)<\/li>\n<li>City of Atlanta <a href=\"http:\/\/www.11alive.com\/article\/news\/local\/cyberattack-hits-atlanta-computers-everyone-who-has-done-business-with-city-may-be-at-risk\/85-530947288\" target=\"_blank\" rel=\"noopener\">hit by Ransomware<\/a> (source: 11Alive)<\/li>\n<li>Time for some <a href=\"https:\/\/medium.com\/netflix-techblog\/netflixbugbounty-ae3bf4489def\" target=\"_blank\" rel=\"noopener\">Netflix and bug bounty<\/a> (source: Netflix)<\/li>\n<li>Did someone <a href=\"https:\/\/www.thedailybeast.com\/exclusive-lone-dnc-hacker-guccifer-20-slipped-up-and-revealed-he-was-a-russian-intelligence-officer\" target=\"_blank\" rel=\"noopener\">forget to switch on their VPN<\/a>? They most certainly did (source: Daily Beast)<\/li>\n<li>Hackers &#8216;<a href=\"https:\/\/www.telegraph.co.uk\/news\/2018\/03\/20\/british-surgeon-helped-syrian-operations-hacked-reveal-secret\/\" target=\"_blank\" rel=\"noopener\">led warplanes to Syrian hospital<\/a>&#8216; (source: The Telegraph)<\/li>\n<li>Dropbox offer a <a href=\"https:\/\/blogs.dropbox.com\/tech\/2018\/03\/protecting-security-researchers\/\" target=\"_blank\" rel=\"noopener\">helping hand<\/a> to security researchers (source: Dropbox)<\/li>\n<li>Orbitz hit by <a href=\"https:\/\/www.scmagazineuk.com\/orbitz-hit-with-data-breach-info-on-880000-payment-cards-at-risk\/article\/752570\/\" target=\"_blank\" rel=\"noopener\">data breach<\/a> (source: SC Magazine)<\/li>\n<li>Top <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/03\/23\/exfiltration-techniques\/\" target=\"_blank\" rel=\"noopener\">exfiltration and evasion techniques<\/a> (source: Help Net Security)<\/li>\n<li>Tax software and <a href=\"https:\/\/www.cnbc.com\/2018\/03\/23\/popular-tax-software-may-expose-users-to-phishing-attacks.html\" target=\"_blank\" rel=\"noopener\">phishing attacks<\/a> (source: CNBC news)<\/li>\n<li>When <a href=\"https:\/\/www.engadget.com\/2018\/03\/16\/chinese-hackers-pwn2own-no-go\/\" target=\"_blank\" rel=\"noopener\">China hoards its hackers<\/a> everyone loses. (Source: Engadget)<\/li>\n<li>A 15-year-old security researcher has discovered a serious flaw in cryptocurrency hardware wallets <a href=\"https:\/\/krebsonsecurity.com\/2018\/03\/15-year-old-finds-flaw-in-ledger-crypto-wallet\/\" target=\"_blank\" rel=\"noopener\">made by Ledger<\/a>. (Source: Krebs on Security)<\/li>\n<li><a href=\"https:\/\/www.theinquirer.net\/inquirer\/news\/3028610\/rottensys-aggressive-malware-found-pre-installed-on-five-million-android-devices\" target=\"_blank\" rel=\"noopener\">RottenSys malware<\/a> found pre-installed on five million Android devices. (Source: the Inquirer)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/reddit-bans-community-dedicated-to-dark-web-markets\/\" target=\"_blank\" rel=\"noopener\">Reddit has banned \/r\/DarkNetMarkets<\/a>, the site&#8217;s biggest community dedicated to discussions related to Dark Web marketplaces. (Source: Bleeping Computer)<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/03\/facebook-scraped-call-text-message-data-for-years-from-android-phones\/\" target=\"_blank\" rel=\"noopener\">Facebook scraped<\/a> call, text message data for years from Android phones. (Source: Ars Techinca)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-19-march-25\/\">A week in security (March 19 \u2013 March 25)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-19-march-25\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 26 Mar 2018 17:00:07 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-19-march-25\/' title='A week in security (March 19 \u2013 March 25)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of notable security news from March 19 to 25, including data theft, ransomware, phone addiction, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bug-bounty\/\" rel=\"tag\">bug bounty<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stephen-hawking-scam\/\" rel=\"tag\">Stephen Hawking scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-19-march-25\/' title='A week in security (March 19 \u2013 March 25)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-19-march-25\/\">A week in security (March 19 \u2013 March 25)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11512,3764,3924,3765,13053,10497,17869,10498],"class_list":["post-11853","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bug-bounty","tag-malware","tag-phishing","tag-ransomware","tag-roundup","tag-security-world","tag-stephen-hawking-scam","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11853"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11853\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11853"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}