{"id":15783,"date":"2019-07-15T07:10:04","date_gmt":"2019-07-15T15:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/15\/news-9530\/"},"modified":"2019-07-15T07:10:04","modified_gmt":"2019-07-15T15:10:04","slug":"news-9530","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/15\/news-9530\/","title":{"rendered":"A week in security (July 8 &#8211; 14)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Jul 2019 14:27:09 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we looked at <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/07\/how-to-securely-send-your-personal-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">ways to send your sensitive information in a secure fashion<\/a>, examined some <a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/\" target=\"_blank\" rel=\"noopener noreferrer\">tactics in incident response land<\/a>, and explored <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/07\/what-should-a-us-federal-data-privacy-law-ideally-include\/\" target=\"_blank\" rel=\"noopener noreferrer\">federal data privacy law<\/a>. We also looked at how <a href=\"https:\/\/blog.malwarebytes.com\/researchers-corner\/2019\/07\/caution-misuse-of-security-tools-can-turn-against-you\/\" target=\"_blank\" rel=\"noopener noreferrer\">security tools can turn against you<\/a>, and took a deep dive into the rather fiendish <a href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Soft Cell attack<\/a>.<\/p>\n<h3>Other cybersecurity news<\/h3>\n<ul>\n<li>The UK government backs facial recognition tech: The controversial trials <a href=\"https:\/\/www.bbc.co.uk\/news\/uk-48959380\" target=\"_blank\" rel=\"noopener noreferrer\">received the backing<\/a> of the British government\u2019s home secretary. (Source: BBC)<\/li>\n<li>Who watches the Watchmen: British police officer <a href=\"https:\/\/www.theregister.co.uk\/2019\/07\/11\/met_police_sgt_pleads_guilty_computer_misuse_crimes\/\" target=\"_blank\" rel=\"noopener noreferrer\">misuses database.<\/a> (Source: The Register)<\/li>\n<li>Zoom zero-day lurches into view: Researchers report a bug which leaves Mac users <a href=\"https:\/\/threatpost.com\/zoom-zero-day-mac-webcam-hijacking\/146317\/\" target=\"_blank\" rel=\"noopener noreferrer\">susceptible to webcam hijacks.<\/a> (Source: ThreatPost)<\/li>\n<li>Listen closely: Google contractors can <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/12\/hey-google-why-are-your-contractors-listening-to-me\/\" target=\"_blank\" rel=\"noopener noreferrer\">listen to Google Home audio clips.<\/a> (Source: Sophos&#8217;s Naked Security Blog)<\/li>\n<li>Agent Smith on the prowl: Android malware capable of replacing code with its own malicious wares found on <a href=\"https:\/\/www.theverge.com\/2019\/7\/10\/20688885\/agent-smith-android-malware-25-million-infections\" target=\"_blank\" rel=\"noopener noreferrer\">more than 25 million devices.<\/a> (Source: The Verge)<\/li>\n<li>TrickBot is what\u2019s hot: The timeless \u201cclassic\u201d returns with a<span class=\"Apple-converted-space\">\u00a0<\/span>few new tricks up its sleeve, including <a href=\"https:\/\/techcrunch.com\/2019\/07\/12\/trickbot-spam-millions-emails\/\" target=\"_blank\" rel=\"noopener noreferrer\">some cunning spam antics.<\/a> (Source: TechCrunch)<\/li>\n<li>Pale Moon rising: Old versions of the popular browser found to be <a href=\"https:\/\/www.zdnet.com\/article\/pale-moon-says-hackers-added-malware-to-older-browser-versions\/\" target=\"_blank\" rel=\"noopener noreferrer\">infected with malware.<\/a> (Source: ZDNet)<\/li>\n<li>Phish attacks are never far: A recent study revealed that one in 99 emails are classified as phishing. Here&#8217;s a good look at <a href=\"https:\/\/smallbiztrends.com\/2019\/07\/phishing-statistics.html\" target=\"_blank\" rel=\"noopener noreferrer\">costs and some additional statistics<\/a>. (Source: Small Business Trends)<\/li>\n<li>Beware of whales: Ship operators are warned by the US coast guard to be on the lookout for <a href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3078728\/malware-targeting-ships-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">targeted spear phishing attempts<\/a>. (Source: Computing News)<\/li>\n<li>Amazon is a Prime target: Beware of <a href=\"https:\/\/www.wired.com\/story\/amazon-prime-day-phishing-campaign\/\" target=\"_blank\" rel=\"noopener noreferrer\">smart phishing scams<\/a> looking to bait those looking for a bargain on Prime Day. (Source: Wired)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/07\/a-week-in-security-july-8-14\/\">A week in security (July 8 &#8211; 14)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/07\/a-week-in-security-july-8-14\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Jul 2019 14:27:09 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/07\/a-week-in-security-july-8-14\/' title='A week in security (July 8 - 14)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of cybersecurity news from July 8\u201314, including secure data sending, federal data privacy law, the Soft Cell attack, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/agent-smith\/\" rel=\"tag\">agent smith<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon\/\" rel=\"tag\">amazon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon-prime\/\" rel=\"tag\">amazon prime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon-prime-day-2019\/\" rel=\"tag\">amazon prime day 2019<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon-prime-phishing\/\" rel=\"tag\">amazon prime phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-malware\/\" rel=\"tag\">android malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facial-recognition\/\" rel=\"tag\">facial recognition<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-home-audio\/\" rel=\"tag\">google home audio<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pale-moon\/\" rel=\"tag\">pale moon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/targeted-spear-phishing\/\" rel=\"tag\">targeted spear phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whaling\/\" rel=\"tag\">whaling<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zoom-zero-day\/\" rel=\"tag\">zoom zero-day<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/07\/a-week-in-security-july-8-14\/' title='A week in security (July 8 - 14)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/07\/a-week-in-security-july-8-14\/\">A week in security (July 8 &#8211; 14)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,22282,5588,18971,22283,22284,10462,11254,14753,22285,10454,3764,22286,3924,5897,13053,22287,13256,10498,10188,22288],"class_list":["post-15783","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-agent-smith","tag-amazon","tag-amazon-prime","tag-amazon-prime-day-2019","tag-amazon-prime-phishing","tag-android","tag-android-malware","tag-facial-recognition","tag-google-home-audio","tag-mac","tag-malware","tag-pale-moon","tag-phishing","tag-privacy","tag-roundup","tag-targeted-spear-phishing","tag-trickbot","tag-week-in-security","tag-whaling","tag-zoom-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15783"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15783\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15783"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}