{"id":13187,"date":"2018-08-24T06:00:21","date_gmt":"2018-08-24T14:00:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/24\/news-6954\/"},"modified":"2018-08-24T06:00:21","modified_gmt":"2018-08-24T14:00:21","slug":"news-6954","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/24\/news-6954\/","title":{"rendered":"This Week in Security News: Facebook and Faxploits"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 24 Aug 2018 13:31:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created by Russian operatives.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/\">Back to Basics: Why We Need to Encourage More Secure IoT Development<\/a><\/strong><\/p>\n<p><em>In cybersecurity, there\u2019s a rule: It\u2019s more effective to fix a problem in the development phase. Nowhere is this truer than in IoT, where devices may never be secured once they leave the production line.<\/em><\/p>\n<p><strong><a href=\"https:\/\/apnews.com\/191032549cca44b9b1b74e1d130a04e5\/Microsoft's-anti-hacking-efforts-make-it-an-internet-cop\">Microsoft\u2019s Anti-Hacking Efforts Make it an Internet Cop<\/a><\/strong><\/p>\n<p><em>Microsoft identified and forced the removal of fake internet domains mimicking conservative U.S. political institutions, which led Russian officials to accuse the company of an anti-Russian \u201cwitch hunt.\u201d<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/how-digital-extortion-impacts-todays-enterprises\/\">How Digital Extortion Impacts Today\u2019s Enterprises<\/a><\/strong><\/p>\n<p><em>As digital extortion attacks increase, it\u2019s imperative that IT leaders are aware of these threats and the impacts they can have on overall company reputation and it\u2019s relationships with partners and customers.<\/em><\/p>\n<p class=\"post-title\"><a href=\"https:\/\/krebsonsecurity.com\/2018\/08\/experts-urge-rapid-patching-of-struts-bug\/\"><strong>Experts Urge Rapid Patching of \u2018Struts\u2019 Bug<\/strong><\/a><\/p>\n<p><em>In September 2017,\u00a0Equifax\u00a0disclosed that a failure to patch one of its Internet servers against a pervasive software flaw \u2014 in a Web component known as\u00a0Apache Struts\u00a0\u2014 led to a breach that\u00a0exposed personal data on 147 million Americans.\u00a0<\/em><\/p>\n<p><strong><a href=\"http:\/\/time.com\/5376354\/dnc-hack-attack-cybersecurity-test\/\">DNC Says Hack Attack Was Actually Just a Cybersecurity Test<\/a><\/strong><\/p>\n<p><em>After initially reporting a potential cyberattack, the Democratic National Committee now believes its database of voters was the target of a third-party test of its cybersecurity.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/ai-and-machine-learning-boosting-compliance-and-preventing-spam\/\">AI and Machine Learning: Boosting Compliance and Preventing Spam<\/a><\/strong><\/p>\n<p><em>Trend Micro takes a closer look at AI and machine learning and the ways these approaches can support compliance with industry requirements and prevent spam messages<\/em><strong>.<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/philips-reveals-code-execution-vulnerabilities-in-cardiovascular-devices\/\">Philips Reveals Code Execution Vulnerabilities in Cardiovascular Devices<\/a><\/strong><\/p>\n<p><em>Vulnerabilities have been discovered in multiple versions of Philips cardiovascular imaging devices.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/deepdiscovery-network-analyzer\/\">Simplifying and Prioritizing Advanced Threat Response Measures<\/a><\/strong><\/p>\n<p><em>Trend Micro\u2019s recently introduced Deep Security<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>, which will help IT security professionals understand more about the attacks on their networks.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.nytimes.com\/2018\/08\/21\/technology\/facebook-political-influence-midterms.html\">Facebook Identifies New Influence Operations Spanning Globe<\/a><\/strong><\/p>\n<p><em>Facebook found and removed 652 fake accounts, pages and groups originating from Iran and Russia that were trying to mislead people around the world. <\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/phishing-for-payroll-nigerian-national-convicted-for-attempted-stealing-of-6m-via-phishing\">Phishing for Payroll: Nigerian National Convicted for Attempted Stealing of $6M+ via Phishing<\/a><\/strong><\/p>\n<p><em>After using phishing scams in an attempt to steal over $6 million from employees of several US colleges and universities, a Nigerian national was convicted on several charges.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.lastwatchdog.com\/trend-micro-takes-multi-pronged-approach-to-narrowing-the-gaping-cybersecurity-skills-gap\/\">Trend Micro Takes Multi-Pronged Approach to Narrowing the Gaping Cybersecurity Skills Gap<\/a><\/strong><\/p>\n<p><em>To alleviate the skills gap, barriers between software developers and IT operations must be broken down, and cybersecurity training must be applied to DevOps and across an organization.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/faxploit-vulnerabilities-in-hp-officejet-printers-can-let-hackers-infiltrate-networks\">Faxploit: Vulnerabilities in HP OfficeJet Printers Can Let Hackers Infiltrate Networks<\/a><\/strong><\/p>\n<p><em>At DEF CON 2018, security researchers demonstrated how they were able to infiltrate networks by exploiting vulnerabilities in HP OfficeJet All-in-One printers. <\/em><\/p>\n<p>Do you think using AI and Machine Learning to boost compliance and prevent spam will be effective? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <u><a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/u><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-facebook-and-faxploits\/\">This Week in Security News: Facebook and Faxploits<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-facebook-and-faxploits\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 24 Aug 2018 13:31:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-facebook-and-faxploits\/\">This Week in Security News: Facebook and Faxploits<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[714],"class_list":["post-13187","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13187"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13187\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13187"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}