{"id":14686,"date":"2019-02-25T10:10:09","date_gmt":"2019-02-25T18:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/25\/news-8435\/"},"modified":"2019-02-25T10:10:09","modified_gmt":"2019-02-25T18:10:09","slug":"news-8435","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/25\/news-8435\/","title":{"rendered":"A week in security (February 18 &#8211; 24)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 25 Feb 2019 16:52:20 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we explored the world of <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2019\/02\/crack-hunting-not-all-its-cracked-up-to-be\/\" target=\"_blank\" rel=\"noopener\">crack hunting<\/a>, gave you a 101 on the <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/good-bots-bad-bots-friend-or-foe\/\" target=\"_blank\" rel=\"noopener\">world of bots<\/a> and their threats and advantages, and took a look at some <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sophisticated-phishing-a-roundup-of-noteworthy-campaigns\/\" target=\"_blank\" rel=\"noopener\">clever phishing scams<\/a>. We also explained how a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/macos-protect-malware\/\" target=\"_blank\" rel=\"noopener\">Mac fends off malware<\/a>, posted a handy \u201c<a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/the-lazy-persons-guide-to-cybersecurity-minimum-effort-for-maximum-protection\/\" target=\"_blank\" rel=\"noopener\">lazy person&#8217;s guide to cybersecurity<\/a>,\u201d and dug into some <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/the-advanced-persistent-threat-files-apt1\/\" target=\"_blank\" rel=\"noopener\">APT action<\/a>.<\/p>\n<h3>Other security news<\/h3>\n<ul>\n<li>YouTube ran into major problems, specifically, a network of <a href=\"https:\/\/www.wired.co.uk\/article\/youtube-pedophile-videos-advertising\" target=\"_blank\" rel=\"noopener\">pedophiles<\/a>. (Source: Wired)<\/li>\n<li>Facebook improved location settings: Android users will now find they <a href=\"https:\/\/newsroom.fb.com\/news\/2019\/02\/location-settings-android\/\" target=\"_blank\" rel=\"noopener\">possess greater control<\/a> over which information is shared with Facebook. (Source: Facebook)<\/li>\n<li>Big extortion, big money: Research reveals \u201csalaries\u201d of up to a <a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/21\/black_hats_sextortion_275k_salaries_helpers\/\" target=\"_blank\" rel=\"noopener\">quarter of a million dollars<\/a> in return for getting up to dubious antics online. (Source: The Register)<\/li>\n<li>Flaw, blimey: A 19-year-old <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\" target=\"_blank\" rel=\"noopener\">WinRAR bug<\/a>\u00a0was discovered. (Source: CheckPoint)<\/li>\n<li>Political infighting leads to data blowout: It\u2019s all very exciting over in the UK, as a major political party reported a former member for <a href=\"https:\/\/www.theguardian.com\/politics\/2019\/feb\/21\/labour-reports-former-mp-joan-ryan-over-alleged-data-breach\" target=\"_blank\" rel=\"noopener\">alleged breach-related activity<\/a>. (Source: The Guardian)<\/li>\n<li>Collection leaks and compromised passwords: How to <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/02\/25\/blocking-compromised-passwords-from-the-collection-leak\/\" target=\"_blank\" rel=\"noopener\">steer clear of trouble<\/a> related to the ongoing \u201cCollection\u201d dumps. (Source: Help Net Security)<\/li>\n<li>An egg in this trying time: A malware campaign offers up an eggy attack <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/fake-jobs-campaigns-delivering-moreeggs-backdoor-fake-job-offers\" target=\"_blank\" rel=\"noopener\">targeting job seekers<\/a>. (Source: Proofpoint)<\/li>\n<li>ATM hacking: A look at how easy\u00a0<a href=\"https:\/\/www.wired.com\/story\/atm-hacking-winpot-jackpotting-game\/\" target=\"_blank\" rel=\"noopener\">ATM shenanigans<\/a> has become. (Source: Wired)<\/li>\n<li>BabyShark phishing: Yes, it\u2019s a spear phishing campaign called <a href=\"https:\/\/www.zdnet.com\/article\/phishing-campaign-attempts-to-spread-a-new-brand-of-snooping-malware\/\" target=\"_blank\" rel=\"noopener\">BabyShark<\/a>.<span class=\"Apple-converted-space\">\u00a0<\/span>(Source: ZDNet)<\/li>\n<li>Wi-Fi and social engineering: A look at some of the most common <a href=\"https:\/\/securityboulevard.com\/2019\/02\/no-one-is-safe-the-five-most-popular-social-engineering-attacks-against-your-companys-wi-fi-network\/\" target=\"_blank\" rel=\"noopener\">social engineering tricks<\/a> deployed against networks. (Source: Security Boulevard)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/02\/week-security-february-18-24\/\">A week in security (February 18 &#8211; 24)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/02\/week-security-february-18-24\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 25 Feb 2019 16:52:20 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/02\/week-security-february-18-24\/' title='A week in security (February 18 - 24)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of security news from February 18\u201324 covering our most recent blogs and happenings in the world of infosec, including ATM hacking, Facebook location settings, spear phishing, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/atm\/\" rel=\"tag\">atm<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/babyshark\/\" rel=\"tag\">babyshark<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/winrar\/\" rel=\"tag\">winRAR<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/02\/week-security-february-18-24\/' title='A week in security (February 18 - 24)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/02\/week-security-february-18-24\/\">A week in security (February 18 &#8211; 24)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,13136,21033,11638,3589,10497,10498,21034],"class_list":["post-14686","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-atm","tag-babyshark","tag-exploit","tag-facebook","tag-security-world","tag-week-in-security","tag-winrar"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14686"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14686\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14686"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}