{"id":6541,"date":"2017-02-07T13:10:54","date_gmt":"2017-02-07T21:10:54","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/07\/news-365\/"},"modified":"2017-02-07T13:10:54","modified_gmt":"2017-02-07T21:10:54","slug":"news-365","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/07\/news-365\/","title":{"rendered":"A week in security (Jan 30th \u2013 Feb 5th)"},"content":{"rendered":"<p>Last week, we took a look at the theories behind preventing users from <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/01\/how-do-i-get-my-employees-to-stop-clicking-on-everything\/\" target=\"_blank\">clicking everything<\/a>\u00a0(don&#8217;t worry, you&#8217;re allowed to click that), a deep dive into <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/locky-bart-ransomware-and-backend-server-analysis\/\" target=\"_blank\">Locky Bart Ransomware<\/a>, and a long term <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/01\/a-look-back-at-the-zyns-iframer-campaign\/\" target=\"_blank\">drive-by download campaign<\/a>. We also explored why you should care about <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/02\/why-do-i-care-about-someone-elses-data-breach\/\" target=\"_blank\">data breaches<\/a> and also released our <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/02\/2016-state-of-malware-report\/\" target=\"_blank\">2016 State of Malware Report<\/a>.<\/p>\n<p>Elsewhere from the last week:<\/p>\n<ul>\n<li>DRM files could be used to <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/02\/03\/uncloaking-tor-browser-users-drm-protected-files\/\" target=\"_blank\">unmask TOR users<\/a>.<\/li>\n<li>WordPress &#8220;secretly&#8221; <a href=\"https:\/\/make.wordpress.org\/core\/2017\/02\/01\/disclosure-of-additional-security-fix-in-wordpress-4-7-2\/\" target=\"_blank\">fixed an issue alongside other<\/a>s,\u00a0in the hope that automatic updates would put paid to any residual risk to WordPress users.<\/li>\n<li>Hacker Warkit Metasploit can now <a href=\"https:\/\/www.theregister.co.uk\/2017\/02\/03\/metasploit_hardware_upgrade\/\" target=\"_blank\">work on hardware such as cars<\/a>.<\/li>\n<li>Hack attacks are &#8220;<a href=\"https:\/\/www.theregister.co.uk\/2017\/02\/03\/k_defense_secretary_warns_over_russian_cyberattacks\/\" target=\"_blank\">destabilizing\u00a0democracy<\/a>&#8221; and nobody has the faintest idea what to do about it.<\/li>\n<li>Banking keyloggers mostly <a href=\"https:\/\/securityintelligence.com\/news\/newly-discovered-banking-malware-creates-fresh-threat-to-users\/\" target=\"_blank\">originating from the US and Singapore<\/a> make waves.<\/li>\n<li>Pokemon GO is still a big deal, and so is lookalike Malware. Heed the <a href=\"http:\/\/www.csoonline.com\/article\/3164806\/mobile-security\/how-to-tell-if-pokemon-go-is-malware.html\" target=\"_blank\">warning signs<\/a>.<\/li>\n<li>Two arrested over claims that Ransomware was found on <a href=\"http:\/\/news.sky.com\/story\/london-pair-held-over-us-camera-hack-ahead-of-trump-inauguration-10755399\" target=\"_blank\">hacked CCTV cameras<\/a>.<\/li>\n<li>More Ransomware, as Ohio county Government finds itself <a href=\"https:\/\/sputniknews.com\/science\/201702041050334504-ohio-country-government-virus-lockdown\/\" target=\"_blank\">shut down<\/a> after an outbreak.<\/li>\n<li>A one-two punch of <a href=\"https:\/\/krebsonsecurity.com\/2017\/02\/irs-scam-blends-ceo-fraud-w-2-phishing\/\" target=\"_blank\">CEO fraud and W-2 phishing<\/a>.<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The Malwarebytes Lab<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/a-week-in-security-jan-30th-feb-5th\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/a-week-in-security-jan-30th-feb-5th\/' title='A week in security (Jan 30th \u2013 Feb 5th)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of notable security news and blog posts from the 30th of January to the 5th of February. This week, we look back at phishing, ransomware, nation state attacks and banking malware.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/democracy\/\" rel=\"tag\">democracy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drm\/\" rel=\"tag\">DRM<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky-bart-ransomware\/\" rel=\"tag\">Locky Bart ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pokemon\/\" rel=\"tag\">pokemon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-roundup\/\" rel=\"tag\">weekly roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/02\/a-week-in-security-jan-30th-feb-5th\/' title='A week in security (Jan 30th \u2013 Feb 5th)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[7037,11236,11156,3924,11237,3765,10497,10498,11238],"class_list":["post-6541","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-democracy","tag-drm","tag-locky-bart-ransomware","tag-phishing","tag-pokemon","tag-ransomware","tag-security-world","tag-week-in-security","tag-weekly-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6541"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6541\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6541"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}