{"id":16857,"date":"2019-11-11T09:10:14","date_gmt":"2019-11-11T17:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/11\/news-10595\/"},"modified":"2019-11-11T09:10:14","modified_gmt":"2019-11-11T17:10:14","slug":"news-10595","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/11\/news-10595\/","title":{"rendered":"A week in security (November 4 &#8211; November 10)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Nov 2019 16:38:19 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we announced the <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/11\/announcing-malwarebytes-4-0-smarter-faster-and-lighter\/\" target=\"_blank\" rel=\"noopener noreferrer\">launch of Malwarebytes 4.0<\/a>, tackled <a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2019\/11\/access-act-might-improve-data-privacy-through-interoperability\/\" target=\"_blank\" rel=\"noopener noreferrer\">data privacy legislation<\/a>, and explored some of the ways robocalls <a href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/11\/here-are-the-most-popular-robocall-scams-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">come gunning for your data and your money<\/a>. We also laid out the steps involved in popular <a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/11\/not-us-you-vendor-email-compromise-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\">vendor email compromise attacks<\/a>.<\/p>\n<h3>Other cybersecurity news<\/h3>\n<ul>\n<li>Bug bounty bonanza: Rockstar Games <a href=\"https:\/\/portswigger.net\/daily-swig\/red-dead-redemption-2-rockstar-games-announces-new-addition-to-its-bug-bounty-program\" target=\"_blank\" rel=\"noopener noreferrer\">open up their bounty program<\/a> to include the newly-released Red Dead Redemption 2 on PC. (Source: The Daily Swig)<\/li>\n<li>The fake news problem: A study shows it\u2019s bad news for <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/11\/11\/recognize-fake-news-on-facebook\/\" target=\"_blank\" rel=\"noopener noreferrer\">people thinking they can avoid bogus information<\/a> on social networking portals. (source: Help Net Security)<\/li>\n<li>On trial for hacking\u2026yourself? A <a href=\"https:\/\/www.theregister.co.uk\/2019\/11\/08\/us_judge_indicted\/\" target=\"_blank\" rel=\"noopener noreferrer\">very confusing story<\/a> involving a judge, their office computer, and a lesson learned in workplace computer forensics. (Source: The Register)<\/li>\n<li>Who\u2019s there? A security flaw: an Internet-connected doorbell <a href=\"https:\/\/www.cyberscoop.com\/ring-doorbell-wi-fi-flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\">causes headaches for owners<\/a>. (Source: CyberScoop)<\/li>\n<li>More fake ads on Facebook: An <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/11\/07\/facebook-scam-steals-famous-faces-and-bbc-branding\/\" target=\"_blank\" rel=\"noopener noreferrer\">old scam returns<\/a> to imitate the BBC and fool eager clickers. (Source: Naked Security)<\/li>\n<li>Social media spy games: an Ex-Twitter employee stands <a href=\"https:\/\/uk.reuters.com\/article\/uk-usa-twitter-saudiarabia\/bond-stayed-for-ex-twitter-employee-accused-of-spying-for-saudi-arabia-idUKKBN1XI2JU\" target=\"_blank\" rel=\"noopener noreferrer\">accused of spying<\/a> for Saudi Arabia. (Source: Reuters)<\/li>\n<li>Cities power down: Johannesburg up and running after a <a href=\"https:\/\/businesstech.co.za\/news\/internet\/352137\/johannesburg-says-its-back-online-after-cyberattack-and-contractual-dispute\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyberattack<\/a>. (Source: BusinessTech)<\/li>\n<li>Sextortion attacks still causing trouble: A new report claims these insidious scams are <a href=\"https:\/\/www.tricitynews.com\/sextortion-cyberattacks-remain-high-1.24000925\" target=\"_blank\" rel=\"noopener noreferrer\">still bringing grief to the masses<\/a>. (Source: Tricity news)<\/li>\n<li>Space-based infosec: If you were wondering how space factors into the US national cyber strategy, then <a href=\"https:\/\/www.fifthdomain.com\/dod\/2019\/11\/08\/how-the-space-cybersecurity-working-group-fosters-communication\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article will probably be helpful<\/a>. (Source: Fifth Domain)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/11\/a-week-in-security-november-4-november-10\/\">A week in security (November 4 &#8211; November 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/11\/a-week-in-security-november-4-november-10\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Nov 2019 16:38:19 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/11\/a-week-in-security-november-4-november-10\/' title='A week in security (November 4 - November 10)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of important security news  from the week of November 4\u201310, including the release of Malwarebytes 4.0, vendor email compromise, fake news, robocalls, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/awis\/\" rel=\"tag\">awis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyber\/\" rel=\"tag\">cyber<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-news\/\" rel=\"tag\">fake news<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/round-up\/\" rel=\"tag\">round up<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter\/\" rel=\"tag\">twitter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/11\/a-week-in-security-november-4-november-10\/' title='A week in security (November 4 - November 10)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2019\/11\/a-week-in-security-november-4-november-10\/\">A week in security (November 4 &#8211; November 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,22647,16128,3589,4724,3919,10554,13405,1932,454,10498],"class_list":["post-16857","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-awis","tag-cyber","tag-facebook","tag-fake-news","tag-hacking","tag-mobile","tag-round-up","tag-social-media","tag-twitter","tag-week-in-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16857"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16857\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16857"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}