{"id":16265,"date":"2019-09-09T09:10:04","date_gmt":"2019-09-09T17:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/09\/news-10007\/"},"modified":"2019-09-09T09:10:04","modified_gmt":"2019-09-09T17:10:04","slug":"news-10007","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/09\/news-10007\/","title":{"rendered":"A week in security (September 2 \u2013 8)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Sep 2019 16:01:30 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we looked at a <a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\">smart social engineering toolkit<\/a>, delved into TrickBot <a href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/09\/trickbot-adds-new-trick-to-its-arsenal-tampering-with-trusted-texts\/\">tampering with trusted texts<\/a>, and explained five ways to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/09\/5-simple-steps-to-securing-your-remote-employees\/\" target=\"_blank\">help keep remote workers safe<\/a>.<\/p>\n<h3>Other cybersecurity news<\/h3>\n<ul>\n<li>A new Chinese Deepfake app is under fire for privacy concerns related to the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/edition.cnn.com\/2019\/09\/03\/tech\/zao-app-deepfake-scli-intl\/index.html\" target=\"_blank\">use of uploaded images<\/a>. (Source: CNN)<\/li>\n<li>Bucking the current trend for city councils and organizations paying the crooks ransom to regain control of computers, the public at large <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.helpnetsecurity.com\/2019\/09\/06\/governments-paying-ransomware-attackers\/\" target=\"_blank\">don\u2019t seem to be happy<\/a> with this arrangement. (Source: Help Net Security)<\/li>\n<li>The classic \u201cbooby trap something students greatly desire\u201d <a rel=\"noreferrer noopener\" aria-label=\"makes a come back (opens in a new tab)\" href=\"https:\/\/thenextweb.com\/security\/2019\/09\/03\/pirated-textbooks-essays-are-full-of-malware\/\" target=\"_blank\">makes a comeback<\/a> as new school year opens. (Source: The Next Web)<\/li>\n<li>Rogue app runs wild on Google Play store with <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.scmagazine.com\/home\/security-news\/holy-cybercrime-batman-joker-malware-commits-ad-fraud-data-theft\/\" target=\"_blank\">ad fraud and data theft<\/a>. (Source: SC Magazine)<\/li>\n<li>Paige Thompson pleaded &#8220;not guilty&#8221; to charges related to the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cyberscoop.com\/capital-one-hacker-not-guilty-paige-thompson\/\" target=\"_blank\">recent Capital One hack<\/a> all over the news. (Source: Cyberscoop)<\/li>\n<li>Multiple malicious websites were used to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2019\/08\/31\/china-google-iphone-uyghur\/\" target=\"_blank\">compromise iPhones<\/a> over a two-year period in an effort to target Uyghur Muslims in China. (Source: TechCrunch)<\/li>\n<li>Executives under fire from spear phishing campaigns are now <a rel=\"noreferrer noopener\" aria-label=\"the number one destination (opens in a new tab)\" href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3081110\/phishing-executives-security-insurance-claims\" target=\"_blank\">the number one cause<\/a> of company insurance claims, according to new research. (Source: Computing)<\/li>\n<li>Deepfake for voices: Scammers made off with $243,000 by <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.itpro.co.uk\/social-engineering\/34308\/fraudsters-use-ai-voice-manipulation-to-steal-200000\" target=\"_blank\">using AI to imitate a UK business owner<\/a>. (Source: IT Pro)<\/li>\n<li>A crime ring in Ghana <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nytimes.com\/2019\/09\/05\/nyregion\/nj-dating-scam-rubbin-sarpong.html\" target=\"_blank\">successfully extracted $2.1 million<\/a> from 30 victims for posing as soldiers looking for love. (Source: The New York Times)<\/li>\n<li>A security researcher found <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2019\/09\/04\/facebook-phone-numbers-exposed\/\" target=\"_blank\">an exposed and readable database of millions of phone numbers<\/a> linked to Facebook accounts. (Source: TechCrunch)<\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-2-8\/\">A week in security (September 2 \u2013 8)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-2-8\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Sep 2019 16:01:30 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-2-8\/' title='A week in security (September 2 \u2013 8)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the latest cybersecurity news for the week of September 2 \u2013 8, including TrickBot\u2019s new trick, a social engineering toolkit, and how to keep remote workers safe.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/back-to-school\/\" rel=\"tag\">back to school<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/back-to-school-cybersecurity\/\" rel=\"tag\">back to school cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/capital-one-data-breach\/\" rel=\"tag\">Capital One data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china\/\" rel=\"tag\">china<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyber-insurance\/\" rel=\"tag\">cyber insurance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/deepfake\/\" rel=\"tag\">deepfake<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/deepfake-for-voices\/\" rel=\"tag\">deepfake for voices<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iphone-compromise\/\" rel=\"tag\">iphone compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/paige-thompson\/\" rel=\"tag\">Paige Thompson<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remote-workers\/\" rel=\"tag\">remote workers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/romance-scam\/\" rel=\"tag\">romance scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scammers\/\" rel=\"tag\">scammers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spear-phishing\/\" rel=\"tag\">spear phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/targeted-attacks\/\" rel=\"tag\">targeted attacks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/uyghur-muslims\/\" rel=\"tag\">Uyghur Muslims<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-2-8\/' title='A week in security (September 2 \u2013 8)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/09\/a-week-in-security-september-2-8\/\">A week in security (September 2 \u2013 8)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,13641,13642,22562,402,22869,17608,22870,3589,22871,22564,3765,22872,22873,10512,10510,11727,12191,13256,22874],"class_list":["post-16265","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-back-to-school","tag-back-to-school-cybersecurity","tag-capital-one-data-breach","tag-china","tag-cyber-insurance","tag-deepfake","tag-deepfake-for-voices","tag-facebook","tag-iphone-compromise","tag-paige-thompson","tag-ransomware","tag-remote-workers","tag-romance-scam","tag-scammers","tag-social-engineering","tag-spear-phishing","tag-targeted-attacks","tag-trickbot","tag-uyghur-muslims"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16265"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16265\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16265"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}