{"id":13327,"date":"2018-09-10T09:10:20","date_gmt":"2018-09-10T17:10:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7094\/"},"modified":"2018-09-10T09:10:20","modified_gmt":"2018-09-10T17:10:20","slug":"news-7094","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7094\/","title":{"rendered":"A week in security (September 3 \u2013 9)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 10 Sep 2018 16:44:57 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we looked at\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\" target=\"_blank\" rel=\"noopener\">spyware going mainstream<\/a>,\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/fortnite-google-play-rebuff-sparks-security-concerns-for-android\/\" target=\"_blank\" rel=\"noopener\">how the popular game Fortnite sparks security concerns for Android users<\/a>, and\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/09\/mac-app-store-apps-are-stealing-user-data\/\" target=\"_blank\" rel=\"noopener\">how certain Mac App Store apps are stealing user data<\/a>.<\/p>\n<h3>Other cybersecurity news:<\/h3>\n<ul>\n<li>Microsoft announced Windows 7 Extended Security Updates in a blog post titled &#8220;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2018\/09\/06\/helping-customers-shift-to-a-modern-desktop\/\" target=\"_blank\" rel=\"noopener\">Helping customers shift to a modern desktop.<\/a>&#8221; (Source: Microsoft)<\/li>\n<li><a href=\"http:\/\/techcrunch.com\/2018\/09\/03\/five-eyes-governments-call-on-tech-giants-to-build-encryption-backdoors-or-else\/\" target=\"_blank\" rel=\"noopener\">&#8220;Five Eyes&#8221; governments<\/a> call on tech giants to build encryption backdoors\u2014or else. (Source: TechCrunch)<\/li>\n<li>How US authorities tracked down the North Korean hacker behind <a href=\"http:\/\/www.zdnet.com\/article\/how-us-authorities-tracked-down-the-north-korean-hacker-behind-wannacry\/\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a>. (Source: ZDNet)<\/li>\n<li><a href=\"https:\/\/www.neowin.net\/news\/protonmail-confirms-it-helped-in-apophis-squad-member-arrest\" target=\"_blank\" rel=\"noopener\">ProtonMail<\/a> confirms it helped in Apophis Squad-member arrest. (Source: Neowin)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tesla-will-restore-car-firmware-os-when-hacking-goes-wrong\/\" target=\"_blank\" rel=\"noopener\">Tesla<\/a>\u00a0will restore car firmware\/OS when hacking goes wrong. (Source: Bleeping Computer)<\/li>\n<li>Google quietly bought <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/09\/03\/google-quietly-bought-mastercard-credit-and-debit-card-records\/\" target=\"_blank\" rel=\"noopener\">Mastercard<\/a> credit and debit card records. (Source: Naked Security)<\/li>\n<li>Feel the shame: <a href=\"https:\/\/www.theregister.co.uk\/2018\/09\/07\/scam_business_emails_on_the_rise\/\" target=\"_blank\" rel=\"noopener\">Email-scammed staffers<\/a> aren&#8217;t telling bosses about it. (Source: The Register)<\/li>\n<li>Vulnerabilities were discovered in two major VPN clients by Cisco <a href=\"https:\/\/blog.talosintelligence.com\/2018\/09\/vulnerability-spotlight-Multi-provider-VPN-Client-Privilege-Escalation.html\" target=\"_blank\" rel=\"noopener\">Talos<\/a>. (Source: Talos Intelligence)<\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/mega-nz-chrome-extension-caught-stealing-passwords-cryptocurrency-private-keys\/\" target=\"_blank\" rel=\"noopener\">MEGA.nz<\/a> Chrome extension caught stealing passwords, cryptocurrency private keys. (Source: ZDNet)<\/li>\n<li>The <a href=\"https:\/\/denver.cbslocal.com\/2018\/09\/07\/brighton-police-home-security-cameras-register\/\" target=\"_blank\" rel=\"noopener\">Brighton police<\/a> department is asking residents to register their home security cameras. (Source: CBS Denver)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/a-week-in-security-september-3-september-9\/\">A week in security (September 3 \u2013 9)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/a-week-in-security-september-3-september-9\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 10 Sep 2018 16:44:57 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/a-week-in-security-september-3-september-9\/' title='A week in security (September 3 \u2013 9)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from September 3 \u2013 9, including spyware going mainstream, Mac App Store apps stealing and abusing customer data, and Fortnite install concerns.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/a-week-in-security\/\" rel=\"tag\">a week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/brighton-police\/\" rel=\"tag\">Brighton Police<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake\/\" rel=\"tag\">fake<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fire-eye\/\" rel=\"tag\">Fire Eye<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/five-eyes\/\" rel=\"tag\">five eyes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fortnite\/\" rel=\"tag\">fortnite<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-app-store\/\" rel=\"tag\">Mac App Store<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mastercard\/\" rel=\"tag\">mastercard<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mega-nz\/\" rel=\"tag\">Mega.nz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/protonmail\/\" rel=\"tag\">protonmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/security-cameras\/\" rel=\"tag\">security cameras<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware\/\" rel=\"tag\">spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/talos\/\" rel=\"tag\">Talos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/techcrunch\/\" rel=\"tag\">TechCrunch<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tesla\/\" rel=\"tag\">tesla<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/a-week-in-security-september-3-september-9\/' title='A week in security (September 3 \u2013 9)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/09\/a-week-in-security-september-3-september-9\/\">A week in security (September 3 \u2013 9)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,10462,19450,11539,19451,19452,18501,12095,11291,19415,13761,19453,10497,10443,14863,12653,13239,12252,10498],"class_list":["post-13327","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-android","tag-brighton-police","tag-fake","tag-fire-eye","tag-five-eyes","tag-fortnite","tag-mac-app-store","tag-mastercard","tag-mega-nz","tag-protonmail","tag-security-cameras","tag-security-world","tag-spyware","tag-talos","tag-techcrunch","tag-tesla","tag-wannacry","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13327"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13327\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13327"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}