{"id":12476,"date":"2018-06-04T10:10:03","date_gmt":"2018-06-04T18:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/04\/news-6245\/"},"modified":"2018-06-04T10:10:03","modified_gmt":"2018-06-04T18:10:03","slug":"news-6245","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/04\/news-6245\/","title":{"rendered":"A week in security (May 28 \u2013 June 3)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 04 Jun 2018 16:51:36 +0000<\/strong><\/p>\n<p>Last week on Labs, we talked about the significance of <a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/05\/seo-poisoning-is-it-worth-it\/\" target=\"_blank\" rel=\"noopener\">SEO poisoning<\/a> in the world of search marketing, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/two-major-canadian-banks-hacked-blackmailed\/\" target=\"_blank\" rel=\"noopener\">blackmail attempts<\/a> against financial institutions in Canada, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/security-vulnerabilities-smart-assistants\/\" target=\"_blank\" rel=\"noopener\">voice command flaws in smart assistants<\/a>, survey and potential phishing <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/instagram-story-spam-claims-free-apple-watch\/\" target=\"_blank\" rel=\"noopener\">scams on Instagram<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/blocks-flash-others-coming-office-365\/\" target=\"_blank\" rel=\"noopener\">the latest changes in Office 365<\/a>.<\/p>\n<p>We also shared <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/conversation-america-geeks\/\" target=\"_blank\" rel=\"noopener\">our latest intel about America Geeks<\/a>, a band of tech scammers that we profiled in 2015 and 2016.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>Theoretically, millions of smart devices are at risk of compromise if the Z-Shave attack is done <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/z-shave-attack-could-impact-over-100-million-iot-devices\/\" target=\"_blank\" rel=\"noopener\">in the wild<\/a>. (Source: Bleeping Computer)<\/li>\n<li>First, SunTrust. Now, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/coca-cola-suffers-breach-at-the-hands-of-former-employee\/\" target=\"_blank\" rel=\"noopener\">Coca-Cola<\/a>. (Source: Bleeping Computer)<\/li>\n<li>I think we saw this coming: <a href=\"https:\/\/internetofbusiness.com\/softbank-pepper-robot-astonishingly-insecure-and-a-cyber-weapon\/\" target=\"_blank\" rel=\"noopener\">robots are extremely insecure<\/a> and can be used as &#8220;cyber weapons.&#8221; (Source: Internet of Business)<\/li>\n<li>When it comes to securing IoTs, multi-modal biometrics user authentication <a href=\"https:\/\/www.abiresearch.com\/press\/face-iris-and-pulse-sensors-fast-track-next-steps-biometrics-security\/\" target=\"_blank\" rel=\"noopener\">could become the norm<\/a>. (Source: ABI Research)<\/li>\n<li>Users in India warned of new malware dubbed <a href=\"https:\/\/www.thehindubusinessline.com\/info-tech\/cert-in-warns-of-new-viruses-that-steal-money-user-data\/article24046073.ece\" target=\"_blank\" rel=\"noopener\">&#8220;virtual girlfriend&#8221; and &#8220;panda banker&#8221;<\/a> that are capable of stealing money and user data. (Source: The Hindu Business Line)<\/li>\n<li>Valve <em>finally<\/em> patched <a href=\"https:\/\/www.zdnet.com\/article\/remote-code-execution-vulnerability-patched-in-valve-steam-client\/\" target=\"_blank\" rel=\"noopener\">a decade-old flaw<\/a> in the Steam client. (Source: ZDNet)<\/li>\n<li>A new trend has emerged: <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/05\/30\/riskiq-q1-mobile-threat-landscape-report\/\" target=\"_blank\" rel=\"noopener\">cryptomining apps are on the rise while malicious apps are declining<\/a>. (Source: Help Net Security)<\/li>\n<li>Here&#8217;s another alarming threat in the mobile space: There was a <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/05\/25\/fraudulent-mobile-app-transactions\/\" target=\"_blank\" rel=\"noopener\">650 percent increase in mobile fraud transactions<\/a> since 2015. (Source: Help Net Security)<\/li>\n<li>Disinformation can be found anywhere. And the United States and Europe are <a href=\"https:\/\/foreignpolicy.com\/2018\/05\/25\/disinformation-wars\/\" target=\"_blank\" rel=\"noopener\">not equipped<\/a> to handle this, especially coming from AI. (Source: Foreign Policy)<\/li>\n<li>Yes! Members of the House and Senate re-introduced <a href=\"https:\/\/edscoop.com\/with-bipartisan-support-do-not-track-kids-legislation-introduced-in-congress\" target=\"_blank\" rel=\"noopener\">a bill to protect children&#8217;s online data<\/a>. (Source: EdScoop)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/a-week-in-security-may-28-june-3\/\">A week in security (May 28 \u2013 June 3)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/a-week-in-security-may-28-june-3\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 04 Jun 2018 16:51:36 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/a-week-in-security-may-28-june-3\/' title='A week in security (May 28 \u2013 June 3)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from May 28 \u2013 June 3, including Instagram scams, America Geeks, IoT flaws, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/america-geeks\/\" rel=\"tag\">America Geeks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/blackmail\/\" rel=\"tag\">blackmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptomining\/\" rel=\"tag\">cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/instagram\/\" rel=\"tag\">Instagram<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot-flaws\/\" rel=\"tag\">iot flaws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-fraud\/\" rel=\"tag\">mobile fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-data-protection\/\" rel=\"tag\">online data protection<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/panda-banker\/\" rel=\"tag\">panda banker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/seo-poisoning\/\" rel=\"tag\">seo poisoning<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smart-assistant-vulnerabilitiesm-coca-cola\/\" rel=\"tag\">smart assistant vulnerabilitiesm coca-cola<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/steam\/\" rel=\"tag\">steam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/virtual-girlfriend\/\" rel=\"tag\">virtual girlfriend<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/a-week-in-security-may-28-june-3\/' title='A week in security (May 28 \u2013 June 3)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/06\/a-week-in-security-may-28-june-3\/\">A week in security (May 28 \u2013 June 3)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18607,8539,15080,2143,18628,18629,18630,18631,3924,3985,10497,18568,18632,11227,18633,10498],"class_list":["post-12476","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-america-geeks","tag-blackmail","tag-cryptomining","tag-instagram","tag-iot-flaws","tag-mobile-fraud","tag-online-data-protection","tag-panda-banker","tag-phishing","tag-scam","tag-security-world","tag-seo-poisoning","tag-smart-assistant-vulnerabilitiesm-coca-cola","tag-steam","tag-virtual-girlfriend","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12476"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12476\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12476"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}