{"id":16112,"date":"2019-08-19T11:10:09","date_gmt":"2019-08-19T19:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/19\/news-9855\/"},"modified":"2019-08-19T11:10:09","modified_gmt":"2019-08-19T19:10:09","slug":"news-9855","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/19\/news-9855\/","title":{"rendered":"A week in security (August 12 \u2013 18)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we took a look at the potential pitfalls of <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/08\/facial-recognition-technology-force-for-good-or-privacy-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">facial recognition technology<\/a>, looked at ways domestic abuse survivors can <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/08\/data-and-device-security-domestic-abuse-survivors\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure their data<\/a>, and explored the <a href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/08\/trojans-ransomware-dominate-2018-2019-education-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">education threat landscape<\/a>. We also kicked off a series looking at the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/08\/the-hidden-bee-infection-chain-part-1-the-stegano-pack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hidden Bee infection chain<\/a>, and put QxSearch installs <a href=\"https:\/\/blog.malwarebytes.com\/pups\/2019\/08\/qxsearch-hijacker-fakes-failed-installs\/\" target=\"_blank\" rel=\"noopener noreferrer\">under the spotlight<\/a>.<\/p>\n<h3 id=\"mce_22\" class=\"editor-rich-text__tinymce mce-content-body\" role=\"textbox\" aria-label=\"Write heading\u2026\" data-is-placeholder-visible=\"false\">Other cybersecurity news<\/h3>\n<ul>\n<li>Android malware plays hide and seek: warning issued as <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/16\/dangerous-new-android-trojan-hides-from-malware-researchers-and-taunts-them-on-twitter\" target=\"_blank\" rel=\"noopener noreferrer\">infection claims to be Adobe Flash player<\/a>. (Source: Forbes)<\/li>\n<li>Keeping an eye on you: Email-delivered infection compromises PCs and <a href=\"https:\/\/thenextweb.com\/security\/2019\/08\/14\/researchers-discover-malware-that-records-users-screens-when-they-watch-porn\/\" target=\"_blank\" rel=\"noopener noreferrer\">records desktop activity.<\/a> (Source: The Next Web)<\/li>\n<li>Hide and seek: Miner tries to go undercover when <a href=\"https:\/\/www.coindesk.com\/new-malware-miner-sneakily-hides-when-task-manager-is-open\" target=\"_blank\" rel=\"noopener noreferrer\">victim looks at Task Manager.<\/a> (Source: Coindesk)<\/li>\n<li>Custom 404 pages lead to phish attacks: Microsoft reports an attack by scammers making full use of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-warns-of-phishing-attacks-using-custom-404-pages\/\" target=\"_blank\" rel=\"noopener noreferrer\">perfectly-crafted error pages<\/a>. (Source: Bleeping Computer)<\/li>\n<li>Cabarrus County in North Carolina hit with costly attack: City representatives fooled by a social engineer <a href=\"https:\/\/www.govtech.com\/security\/Social-Engineering-Attack-Nets-17M-in-Government-Funds.html\" target=\"_blank\" rel=\"noopener noreferrer\">parted with some $2.5 million dollars<\/a>. (Source: Government Technology)<span class=\"Apple-converted-space\">&nbsp;<\/span><\/li>\n<li>Poor password practice revelations: A Google Chrome extension highlights that <a href=\"https:\/\/www.theregister.co.uk\/2019\/08\/16\/google_stanford_chrome_passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">we could do much better<\/a> when told about exposed passwords. (Source: The Register)<\/li>\n<li>Facebook, meet class action lawsuit: Facebook users may shortly be going to war with the social media giant over the use of <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/12\/facebook-facial-recognition-class-action-suit-gets-courts-go-ahead\/\" target=\"_blank\" rel=\"noopener noreferrer\">facial recognition technology<\/a>. (Source: Naked Security)<\/li>\n<li>Swatting danger rears head once more: The Fortnite World Cup Champion recently suffered a <a href=\"https:\/\/kotaku.com\/fortnites-teenage-world-champ-swatted-live-on-stream-1837161025\" target=\"_blank\" rel=\"noopener noreferrer\">dangerous Swat attack at his home<\/a>. (Source: Kotaku)<\/li>\n<li>Of war and databases: Want to see what happens when users of hacking sites decide to target another one? <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/08\/hacker-sites-incriminating-database-published-online-by-rival-group\/\" target=\"_blank\" rel=\"noopener noreferrer\">Of course you do<\/a>. (Source: Ars Technica)<\/li>\n<li>Google makes Nest cam easier to spot: The tech giant announces major changes to <a href=\"https:\/\/www.mattcrampton.com\/blog\/Google_forcing_nest_cameras_visual_indicator_light_to_be_on\/\" target=\"_blank\" rel=\"noopener noreferrer\">the status lights function on Nest cameras.<\/a> (Source: Matt Crampton blog)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/08\/a-week-in-security-august-12-18\/\">A week in security (August 12 \u2013 18)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/08\/a-week-in-security-august-12-18\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/08\/a-week-in-security-august-12-18\/' title='A week in security (August 12 \u2013 18)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/password\/\" rel=\"tag\">password<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/08\/a-week-in-security-august-12-18\/' title='A week in security (August 12 \u2013 18)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/08\/a-week-in-security-august-12-18\/\">A week in security (August 12 \u2013 18)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,10462,3589,1670,11831,10511,3924,13053,10498],"class_list":["post-16112","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-android","tag-facebook","tag-google","tag-password","tag-phish","tag-phishing","tag-roundup","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16112"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16112\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16112"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}