{"id":13201,"date":"2018-08-26T14:10:02","date_gmt":"2018-08-26T22:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/26\/news-6968\/"},"modified":"2018-08-26T14:10:02","modified_gmt":"2018-08-26T22:10:02","slug":"news-6968","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/26\/news-6968\/","title":{"rendered":"A week in security (August 13 \u2013 August 19)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Aug 2018 17:33:18 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we talked about how <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/08\/process-doppelganging-meets-process-hollowing_osiris\/\" target=\"_blank\" rel=\"noopener\">Process Doppelg\u00e4nging meets Process Hollowing in the Osiris dropper<\/a>, provided <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/08\/back-to-school-hints-tips-and-links\/\" target=\"_blank\" rel=\"noopener\">hints, tips, and links for a safer school year<\/a>, gave a recap of <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/08\/black-hat-2018-recap\/\" target=\"_blank\" rel=\"noopener\">Black Hat USA 2018<\/a>, offered some tips for a <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/08\/secure-content-management-system\/\" target=\"_blank\" rel=\"noopener\">secure content management system<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/liar-liar-pants-fire-barclays-phish-claims-cards-explode\/\" target=\"_blank\" rel=\"noopener\">highlighted a silly snail-mail scamming attempt<\/a>, and provided insight in <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/under-the-hoodie-why-money-power-and-ego-drive-hackers-to-cybercrime\/\" target=\"_blank\" rel=\"noopener\">why money, power, and ego drive hackers to cybercrime<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cnet.com\/news\/walmart-gains-patent-to-eavesdrop-on-shoppers-and-employees-in-stores\/\" target=\"_blank\" rel=\"noopener\">Walmart<\/a> gains patent to eavesdrop on shoppers and employees in stores. (Source: CNet)<\/li>\n<li>FBI warns of &#8220;unlimited&#8221;\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2018\/08\/fbi-warns-of-unlimited-atm-cashout-blitz\/\" target=\"_blank\" rel=\"noopener\">ATM cashout<\/a> (Source: Krebs on Security)<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/tech-policy\/2018\/08\/security-theater-meets-def-con-as-room-searches-spark-controversy\/\" target=\"_blank\" rel=\"noopener\">Caesars Palace<\/a> not-so-Praetorian guards intimidate DEF CON goers with searches. (Source: Ars Technica)<\/li>\n<li>Researchers discovered a way to hack <a href=\"https:\/\/www.techspot.com\/news\/75940-tencent-researchers-discovered-way-hack-echo-smart-speakers.html\" target=\"_blank\" rel=\"noopener\">Echo<\/a> smart speakers. (Source: Techspot)<\/li>\n<li>Researchers have found another serious security flaw in computer chips designed by <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-45191697\" target=\"_blank\" rel=\"noopener\">Intel<\/a>. (Source: BBC)<\/li>\n<li>Victims lose access to thousands of photos as <a href=\"https:\/\/threatpost.com\/victims-lose-access-to-thousands-of-photos-as-instagram-hack-spreads\/135112\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a> hack spreads. (Source: ThreatPost)<\/li>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2018\/08\/17\/web_cache_poisoning\/\" target=\"_blank\" rel=\"noopener\">Web cache poisoning<\/a> just got real: How to fling evil code at victims. (Source: The Register)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canadian-telcos-patch-vulnerability-in-trs-systems\/\" target=\"_blank\" rel=\"noopener\">Canadian telcos<\/a> patch vulnerability in TRS systems. (Source: BleepingComputer)<\/li>\n<li><a href=\"https:\/\/threatpost.com\/philips-vulnerability-exposes-sensitive-cardiac-patient-information\/136669\/\" target=\"_blank\" rel=\"noopener\">Philips<\/a> vulnerability exposes sensitive cardiac patient information. (Source: Threatpost)<\/li>\n<li><a href=\"https:\/\/www.scmagazine.com\/fortnite-login-credentials-sold-on-the-dark-web-for-cheap\/article\/789488\/\" target=\"_blank\" rel=\"noopener\">Fortnite<\/a> login credentials sold on the dark web for cheap. (Source SCMagazine)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/08\/a-week-in-security-august-13-august-19\/\">A week in security (August 13 \u2013 August 19)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/08\/a-week-in-security-august-13-august-19\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Aug 2018 17:33:18 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/08\/a-week-in-security-august-13-august-19\/' title='A week in security (August 13 \u2013 August 19)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A round up of the security news from August 13 \u2013 19, including an in-depth discussion of what drives the average cybercriminal to crime.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/a-week-in-security\/\" rel=\"tag\">a week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/instagram\/\" rel=\"tag\">Instagram<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/intel\/\" rel=\"tag\">Intel<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-cache-poisoning\/\" rel=\"tag\">web cache poisoning<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/08\/a-week-in-security-august-13-august-19\/' title='A week in security (August 13 \u2013 August 19)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/08\/a-week-in-security-august-13-august-19\/\">A week in security (August 13 \u2013 August 19)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,2143,8397,10497,19265,10498],"class_list":["post-13201","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-instagram","tag-intel","tag-security-world","tag-web-cache-poisoning","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13201"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13201\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13201"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}