{"id":12457,"date":"2018-06-01T07:00:17","date_gmt":"2018-06-01T15:00:17","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/01\/news-6226\/"},"modified":"2018-06-01T07:00:17","modified_gmt":"2018-06-01T15:00:17","slug":"news-6226","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/01\/news-6226\/","title":{"rendered":"This Week in Security News: ePrivacy and Hack Back"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Jun 2018 14:16:27 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the Council of the European Union reviewed a bill dubbed the \u201cePrivacy\u201d Regulation, which targets message-sharing services like WhatsApp and Skype. Also, a failed Georgian cybersecurity bill gives a glimpse into the future of cybersecurity laws in the U.S.<\/p>\n<p>Read on to learn more.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2018\/05\/30\/the-cybersecurity-202-white-house-cybersecurity-report-shows-federal-agencies-still-struggling-to-get-secure\/5b0d79c81b326b492dd07ed3\/?utm_term=.c35743069e0f\"><strong>The Cybersecurity 202: White House Cybersecurity Report Shows Federal Agencies Still Struggling to Get Secure<\/strong><\/a><\/p>\n<p><em>Dozens of federal agencies have cybersecurity programs that aren\u2019t properly equipped to deal with cyber intrusions in their networks, according to a new report released by the White House. <\/em><\/p>\n<p><strong><em><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/emerging-5g-technology-could-compromise-sim-card-dependent-iot-devices\/\">Emerging 5G Technology Could Compromise SIM Card-Dependent IoT Devices on Massive Scale<\/a><\/em><\/strong><\/p>\n<p><em>Already, current cellular network technologies such as 3G and 4G allow fast wireless communication. But the next evolution, 5G, is set to afford even faster connections along with greater reliability.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/trojan-mnubot-leverages-microsoft-sql-for-evasion-targets-brazilian-banks\"><strong>Trojan MnuBot Leverages Microsoft SQL For Evasion, Targets Brazilian Banks<\/strong><\/a><\/p>\n<p><em>A recently discovered malware named MnuBot functions as a remote access trojan (RAT) and uses Microsoft SQL server database as command and control (C&amp;C) server.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.darkreading.com\/cloud\/over-5k-gas-station-tank-gauges-sit-exposed-on-the-public-net-\/d\/d-id\/1331920\">Over 5K Gas Station Tank Gauges Sit Exposed on the Public Net<\/a><\/strong><\/p>\n<p><em>One gas station failed its PCI compliance test due to security holes in its automated gas tank gauge configuration, researcher says.<\/em><\/p>\n<p><a href=\"https:\/\/www.cnet.com\/news\/russia-linked-hacker-gets-5-years-for-yahoo-security-breach\/\"><strong>Russia-Linked Hacker Gets 5 Years in Yahoo Security Breach<\/strong><\/a><\/p>\n<p><em>A hacker who worked for a Russian spy agency was sentenced to five years in prison for using data stolen in a massive Yahoo data breach to gain access to private emails. <\/em><\/p>\n<p><strong><a href=\"https:\/\/www.investors.com\/research\/industry-snapshot\/cybersecurity-companies\/\">Cybersecurity: Fresh Challenges Breed New Companies, Opportunities<\/a><\/strong><\/p>\n<p><em>The WannaCry cybersecurity attack in May, 2017, targeted tens of thousands of computers scattered across more than 70 countries. The attackers, thought to a be a group located in North Korea, demanded ransom fees in bitcoin. They promised to unfreeze computers in return.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/android-devices-found-preinstalled-with-adware-cosiloon\"><strong>Android Devices Found Preinstalled With Adware Cosiloon<\/strong><\/a><\/p>\n<p><em>Thousands of Android devices owned by users in over 100 countries, including the U.S., Russia, Germany, the U.K., Greece, France, and Venezuela, have been found preinstalled with the adware Cosiloon.<\/em><\/p>\n<p><a href=\"https:\/\/www.technologyreview.com\/the-download\/611225\/gdpr-was-just-the-beginning-next-up-eprivacy\/\"><strong>GDPR was Just the Beginning &#8211; The Next Big Fight in Data Protection is \u201cePrivacy.\u201d<\/strong><\/a><\/p>\n<p><em>The GDPR is in full effect, and the next legal battle over data protection in Europe is here: the fight for \u201cePrivacy\u201d Regulation.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/identifying-top-vulnerabilities-in-networks-old-vulnerabilities-iot-botnets-wireless-connection-exploits\/\"><strong>Identifying Top Vulnerabilities in Networks: Old Vulnerabilities, IoT Botnets, Wireless Connection Exploits<\/strong><\/a><\/p>\n<p><em>Using our IoT Smart Checker, a tool that scans networks for potential security risks, we looked into home and other small network environments and the vulnerabilities that connected devices usually encounter.<\/em><\/p>\n<p><a href=\"https:\/\/www.ciodive.com\/news\/what-georgias-failed-hack-back-bill-says-about-the-future-of-cybersecuri\/524216\/\"><strong>What Georgia&#8217;s Failed &#8216;Hack Back&#8217; Bill Says About the Future of Cybersecurity Laws<\/strong><\/a><\/p>\n<p><em>Not long after Atlanta disclosed a citywide ransomware attack, the state government proposed a cybercrimes bill that was met with security industry criticism. <\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/cryptocurrency-mining-abuse-of-system-resources\/\"><strong>Cryptocurrency Mining: Abuse of System Resources<\/strong><\/a><\/p>\n<p><em>Cryptocurrency mining attacks have begun to take hold, and experts predict that they won&#8217;t stall anytime soon \u2013 on the other hand, cybercriminals may only increase this abuse of resources.<\/em><\/p>\n<p>What do you think of the new \u201cePrivacy\u201d Regulation? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-eprivacy-and-hack-back\/\">This Week in Security News: ePrivacy and Hack Back<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-eprivacy-and-hack-back\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Jun 2018 14:16:27 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the Council of the European Union reviewed a bill dubbed the \u201cePrivacy\u201d Regulation, which targets message-sharing services like WhatsApp and Skype. Also, a failed Georgian cybersecurity bill&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-eprivacy-and-hack-back\/\">This Week in Security News: ePrivacy and Hack Back<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11052,10422,17944,18612,12252,10440],"class_list":["post-12457","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cryptocurrency","tag-current-news","tag-eprivacy","tag-trojan-rat","tag-wannacry","tag-whatsapp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12457"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12457\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12457"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}