{"id":13021,"date":"2018-08-06T09:10:03","date_gmt":"2018-08-06T17:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/06\/news-6788\/"},"modified":"2018-08-06T09:10:03","modified_gmt":"2018-08-06T17:10:03","slug":"news-6788","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/06\/news-6788\/","title":{"rendered":"A week in security (July 30 \u2013 August 5)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Aug 2018 16:07:39 +0000<\/strong><\/p>\n<p>Last week, we posted a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/whats-spam-mailbox-week\/\" target=\"_blank\" rel=\"noopener\">roundup of spam<\/a> that may have landed in your mailbox, talked about <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noopener\">what makes us susceptible to social engineering<\/a> tactics, and took <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/08\/explained-what-is-big-data\/\" target=\"_blank\" rel=\"noopener\">a deep dive into big data<\/a>.<\/p>\n<h3>Other news:<\/h3>\n<ul>\n<li>Facebook <a href=\"https:\/\/www.wsj.com\/articles\/facebook-removes-fake-accounts-that-displayed-activity-consistent-with-russian-efforts-during-2016-election-1533055712\" target=\"_blank\" rel=\"noopener\">claimed<\/a> to have removed accounts that display behavior consistent with possible Russian actors engaged in misinformation. (Source: The Wall Street Journal)<\/li>\n<li>Yale University <a href=\"https:\/\/www.nbcconnecticut.com\/news\/local\/Social-Security-Numbers-Accessed-in-Yale-University-Data-Breach-489556661.html\" target=\"_blank\" rel=\"noopener\">disclosed<\/a> that they were breached at least a decade ago. (Source: NBC &#8211; Connecticut)<\/li>\n<li>High school students, be on the lookout! If you receive email or snail mail from organizations with impressive-sounding names, <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/08\/01\/high-schoolers-data-put-up-for-sale-after-being-scraped-from-surveys\/\" target=\"_blank\" rel=\"noopener\">consider<\/a> that it may just be a carefully packaged marketing scheme. (Source: Sophos&#8217;s Naked Security Blog)<\/li>\n<li>A researcher from Amnesty International <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/kzyg3a\/smartphone-malware-nso-group-amnesty-international-saudi-arabia\" target=\"_blank\" rel=\"noopener\">revealed<\/a> that hackers have targeted them with malware from an Israeli vendor. (Source: Motherboard)<\/li>\n<li>Certain e-commerce providers in the UK were <a href=\"https:\/\/www.grahamcluley.com\/online-fashion-shoppers-exposed-ecommerce-breach\/\" target=\"_blank\" rel=\"noopener\">affected<\/a> by a data breach and exposed potentially more than a million user data. (Source: Graham Cluley&#8217;s blog)<\/li>\n<li>A game on the Steam platform <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/gy3dx7\/steam-pulled-game-for-alleged-cryptocurrency-mining-scam-abstractism\" target=\"_blank\" rel=\"noopener\">was found<\/a> hijacking video game player machines to mine cryptocurrency. (Source: Motherboard)<\/li>\n<li>The Alaskan Borough of Matanuska-Susitna <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/08\/01\/staff-dust-off-their-typewriters-after-malware-attack\/\" target=\"_blank\" rel=\"noopener\">was infected<\/a> with malware that disrupted normal activities so much that they had to dust off old typewriters to continue issuing receipts. (Source: Sophos&#8217;s Naked Security blog)<\/li>\n<li>While we&#8217;re on the subject of breaches, here&#8217;s another popular victim: <a href=\"https:\/\/techcrunch.com\/2018\/08\/01\/reddit-breach-exposes-user-data-but-not-much\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>. (Source: TechCrunch)<\/li>\n<li>Google <a href=\"https:\/\/coincentral.com\/crypto-mining-googles-play-store-joins-apple-in-banning-mining-apps\/\" target=\"_blank\" rel=\"noopener\">joined<\/a> Apple in banning mining apps on the Play Store. (Source: Coin Central)<\/li>\n<li>An independent security researcher from the UK <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/DHLthemed+malspam+reveals+embedded+malware+in+animated+gif\/23944\/\" target=\"_blank\" rel=\"noopener\">spotted<\/a> a DHL-themed spam carrying malware hidden in a GIF file. (Source: The SANS ISC InfoSec Forums)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-july-30-august-5\/\">A week in security (July 30 \u2013 August 5)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-july-30-august-5\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Aug 2018 16:07:39 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-july-30-august-5\/' title='A week in security (July 30 \u2013 August 5)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from July 30 \u2013 August 5, including cryptomining, big data, social engineering, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/big-data\/\" rel=\"tag\">big data<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/breach\/\" rel=\"tag\">breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptomining\/\" rel=\"tag\">cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/recap\/\" rel=\"tag\">recap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/reddit\/\" rel=\"tag\">reddit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/steam-cryptominer\/\" rel=\"tag\">steam cryptominer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-july-30-august-5\/' title='A week in security (July 30 \u2013 August 5)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/week-security-july-30-august-5\/\">A week in security (July 30 \u2013 August 5)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11183,11510,15080,3589,3764,10503,1571,10497,10510,10518,19145,10498,10506],"class_list":["post-13021","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-big-data","tag-breach","tag-cryptomining","tag-facebook","tag-malware","tag-recap","tag-reddit","tag-security-world","tag-social-engineering","tag-spam","tag-steam-cryptominer","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13021"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13021\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13021"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}