{"id":7493,"date":"2017-05-01T10:10:57","date_gmt":"2017-05-01T18:10:57","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/01\/news-1278\/"},"modified":"2017-05-01T10:10:57","modified_gmt":"2017-05-01T18:10:57","slug":"news-1278","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/05\/01\/news-1278\/","title":{"rendered":"A week in security (Apr 24 \u2013 Apr 30)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 01 May 2017 17:07:19 +0000<\/strong><\/p>\n<p>Last week we gave some important tips on how to <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/mobile-menace-monday-securing-your-privacy-on-android\/\" target=\"_blank\">secure your privay on Android<\/a>\u00a0and we\u00a0warned our readers about a new iCloud scam and unraveled a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/new-osx-dok-malware-intercepts-web-traffic\/\" target=\"_blank\">new Mac Malware known as OSX.Dok<\/a>.<\/p>\n<p>Tech support scammers can be very convincing, so we showed you how you can determine whether you are dealing with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/do-i-have-malwarebytes-or-a-tech-support-scam\/\" target=\"_blank\">the actual company or someone pretending to be their tech support<\/a>. Also, Tech support scams are so lucrative that <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/system-optimizers-turning-tech-support-scams\/\" target=\"_blank\">some PUPs, specifically \u201csystem optimizers\u201d, decided to increase their playing field<\/a>\u00a0to include scamming.<\/p>\n<p>We also made a start with a <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/04\/adware-the-series-part-1\/\" target=\"_blank\">new series about Adware<\/a> and took <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/terror-ek-going-pro-not-quite\/\" target=\"_blank\">a quick peek at the changes the Terror Exploit Kit is going through<\/a>. And we gave you a more detailed overview of how the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/a-story-of-fonts-by-the-eitest-hoeflertext-campaign\/\" target=\"_blank\">EITest campaign tries to trick users into downloading a fake font file<\/a>.<\/p>\n<p>We realize how all this advice can be overwhelming and posted some tips on\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/04\/how-to-fight-security-fatigue\/\" target=\"_blank\">how to fight security fatigue<\/a>.<\/p>\n<p>Below are notable news stories and security-related happenings:<\/p>\n<ul>\n<li>Researchers at the University of Michigan discovered a <a href=\"http:\/\/eecs.umich.edu\/eecs\/about\/articles\/2017\/open-port-vulnerabilities.html\" target=\"_blank\">security hole present in hundreds of applications in the Google Playstore<\/a>.<\/li>\n<li><a href=\"https:\/\/www.darknet.org.uk\/2017\/04\/hajime-botnet-reaches-300000-hosts-no-malicious-functions\/\" target=\"_blank\">Hajime Botnet Reaches 300,000 Hosts With No Malicious Functions<\/a>.<\/li>\n<li><a href=\"http:\/\/www.csoonline.com\/article\/3193221\/security\/network-management-vulnerability-exposes-cable-modems-to-hacking.html\" target=\"_blank\">Network management vulnerability exposes cable modems to hacking<\/a>.<\/li>\n<li><a href=\"https:\/\/fbnewsroomus.files.wordpress.com\/2017\/04\/facebook-and-information-operations-v1.pdf\" target=\"_blank\">Facebook is being manipulated by nation states to act as an \u201cinformation operations\u201d platform.<\/a><\/li>\n<li><a href=\"http:\/\/www.esecurityplanet.com\/hackers\/russian-hackers-target-french-presidential-campaign.html\" target=\"_blank\">Russian Hackers Target French Presidential Campaign<\/a>.<\/li>\n<li><a href=\"http:\/\/www.theregister.co.uk\/2017\/04\/28\/fileless_malware_menace\/\" target=\"_blank\">Sneaky &#8216;fileless&#8217; malware flung at Israeli targets via booby-trapped Word docs<\/a>.<\/li>\n<li><a href=\"http:\/\/www.cnbc.com\/2017\/04\/25\/this-is-what-has-people-feeling-queasy-at-chipotle-now.html\" target=\"_blank\">This is what has people feeling queasy at Chipotle now<\/a>.<\/li>\n<li>Researchers at the New York University claim to have found <a href=\"https:\/\/www.blackhat.com\/us-17\/briefings.html#and-then-the-script-kiddie-said-let-there-be-no-light.-are-cyber-attacks-on-the-power-grid-limited-to-nation-state-actors\" target=\"_blank\">a serious flaw in some of General Electric Multilin products<\/a>.<\/li>\n<li><a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/tricky-phishing-scam-manages-impersonate-legitimate-urls\/\" target=\"_blank\">This Tricky Phishing Scam Manages to Impersonate Legitimate URLS<\/a>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Stay safe!<\/p>\n<p>&nbsp;<\/p>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/a-week-in-security-apr-24-apr-30-2\/\">A week in security (Apr 24 \u2013 Apr 30)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/a-week-in-security-apr-24-apr-30-2\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 01 May 2017 17:07:19 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/a-week-in-security-apr-24-apr-30-2\/' title='A week in security (Apr 24 \u2013 Apr 30)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2014\/09\/photodune-3434769-calendar-s.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of notable security news and blog posts from the 24th of April to the 30th. We covered a lot of different subject, exploit kits, adware, Tech Support Scams, Android and Mac threats. And how to fight security fatigue.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eitest\/\" rel=\"tag\">eitest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/osx-dok\/\" rel=\"tag\">OSX.Dok<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scams\/\" rel=\"tag\">tech support scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/terror-ek\/\" rel=\"tag\">Terror EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/a-week-in-security-apr-24-apr-30-2\/' title='A week in security (Apr 24 \u2013 Apr 30)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/05\/a-week-in-security-apr-24-apr-30-2\/\">A week in security (Apr 24 \u2013 Apr 30)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,11158,12118,10497,10577,11945,10498,10506],"class_list":["post-7493","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-eitest","tag-osx-dok","tag-security-world","tag-tech-support-scams","tag-terror-ek","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7493"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7493\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7493"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}