{"id":15082,"date":"2019-04-12T07:00:01","date_gmt":"2019-04-12T15:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/12\/news-8831\/"},"modified":"2019-04-12T07:00:01","modified_gmt":"2019-04-12T15:00:01","slug":"news-8831","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/12\/news-8831\/","title":{"rendered":"This Week in Security News: 5G Security and Tax Scams"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Apr 2019 14:00:11 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/securing-enterprises-for-5g-connectivity\"><strong>Securing Enterprises for 5G Connectivity<\/strong><\/a><\/p>\n<p><em>For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start.<\/em><strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/it-online.co.za\/2019\/04\/10\/trend-micro-extends-security-offerings\/\"><strong>Trend Micro Extends Security Offerings<\/strong><\/a><\/p>\n<p><em>Trend Micro has announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes Engine (GKE) and Gmail on the G Suite.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/what-you-need-to-know-about-tax-scams\"><strong>What You Need To Know About Tax Scams<\/strong><\/a><\/p>\n<p><em>While many taxpayers are rushing to file their returns, cybercriminals use the tax season to deceive people into unwittingly handing out credentials, money, and personally identifiable information.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/hackers-try-smaller-amounts-three-years-after-100-million-heist\"><strong>Hackers Go For Smaller Amounts Three Years After $100 Million Heist<\/strong><\/a><\/p>\n<p><em>In 2018, attempted fraudulent transactions ranged from $250,000 and $2 million, down from tens of millions of dollars in the previous two years, interbank messaging system Swift said in a report.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/mirai-variant-spotted-using-multiple-exploits-targets-various-routers\"><strong>Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers<\/strong><\/a><\/p>\n<p><em>Trend Micro researchers uncovered a new variant of the notorious\u00a0Mirai malware\u00a0that uses multiple exploits to target various routers and\u00a0internet-of-things devices.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/04\/yahoo-tries-to-settle-3-billion-account-data-breach-with-118-million-payout\/\"><strong>Yahoo Tries to Settle 3-Billion-Account Data Breach with $118 Million Payout<\/strong><\/a><\/p>\n<p><em>Yahoo and plaintiffs, in a case over a data breach affecting three billion user accounts, have agreed to and filed a settlement that would require Yahoo to pay $117.5 million.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-attack-hinders-michigan-county-operations\"><strong>Ransomware Attack Hinders Michigan County Operations<\/strong><\/a><\/p>\n<p><em>On April 2, Michigan\u00a0County reported\u00a0a\u00a0ransomware\u00a0attack on their network, which was more severe than originally thought. The county has not been able to resume normal operations due to the attack.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/muddywater-apt-spotted-attacking-android\/d\/d-id\/1334387\"><strong>&#8216;MuddyWater&#8217; APT Spotted Attacking Android<\/strong><\/a><\/p>\n<p><em>A cyber espionage group believed to be out of Iran and known for targeting telecommunications providers and government bodies in the Middle East has added to its arsenal malware for targeting Android devices.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/phishing-attack-uses-browser-extension-tool-singlefile-to-obfuscate-malicious-log-in-pages\/\"><strong>Phishing Attack Uses Browser Extension Tool SingleFile to Obfuscate Malicious Log-in Pages<\/strong><\/a><\/p>\n<p><em>Phishing\u00a0is a permanent staple of a cybercrime due to its effectiveness. The concept behind phishing itself is simple but the strategies used by cybercriminals have become increasingly sophisticated.\u00a0<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/adobe-fixes-24-critical-flaws-in-acrobat-reader-flash-shockwave-player\/143632\/\"><strong>Adobe Fixes 24 Critical Flaws in Acrobat Reader, Flash, Shockwave Player<\/strong><\/a><\/p>\n<p><em>During its regularly scheduled April security update, Adobe overall issued 43 patches, including ones for 24 critical vulnerabilities in eight of its products.<\/em><\/p>\n<p>What security techniques or technologies is your enterprise using to prepare for new advancements like 5G? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-5g-security-and-tax-scams\/\">This Week in Security News: 5G Security and Tax Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-5g-security-and-tax-scams\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Apr 2019 14:00:11 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season. Read on: Securing Enterprises for 5G Connectivity For the advantages of&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-5g-security-and-tax-scams\/\">This Week in Security News: 5G Security and Tax Scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,4500,10400,714,11439],"class_list":["post-15082","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cybersecurity","tag-mirai","tag-security","tag-tax-season"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15082"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15082\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15082"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}