Security

QuickHealSecurity

I am invisible – Monero (XMR) Miner

Credit to Author: Ghanshyam More| Date: Mon, 03 Sep 2018 10:27:58 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs came across a malware which mines Monero(XMR). This miner has many…

Read More
ComputerWorldIndependent

Firefox to auto-block ad trackers

Credit to Author: Gregg Keizer| Date: Fri, 31 Aug 2018 10:13:00 -0700

Mozilla this week said that its Firefox browser will soon start to automatically block some ad tracking technologies that the company claimed impact page load performance and shadow users wherever they go.

“In the near future, Firefox will — by default — protect users by blocking tracking,” wrote Nick Nguyen, Mozilla’s top Firefox executive, in an August 30 post to a company blog.

Mozilla added what it dubbed “Tracking Protection” to Firefox 57, a.k.a. “Quantum,” last fall. Since then, the feature has remained opt-in, meaning people must manually enable it from the browser’s Preferences display if they want to use it. When switched on, Tracking Protection blocks a wide range of content, not just advertisements but also in-page trackers that sites or ad networks implant to follow users from one website to another. Such trackers are the reason why an ad for underwear from a specific vendor seemingly pops up wherever one goes after one has browsed the underwear selection at the seller’s website.

To read this article in full, please click here

Read More
SecurityTrendMicro

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Air Canada and Cryptojacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 31 Aug 2018 14:33:05 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an…

The post This Week in Security News: Air Canada and Cryptojacking appeared first on .

Read More
ComputerWorldIndependent

Apple insists developers ramp up their privacy commitments

Credit to Author: Jonny Evans| Date: Fri, 31 Aug 2018 06:45:00 -0700

Apple recently told the U.S. Congress that is sees customer privacy as a “human right”, though the explanation didn’t at that time extend to how third-party developers treat data they get from iOS apps. Now it does.

Privacy for the rest of us

Starting October 3, Apple will insist that all third-party apps (including new apps and app updates) submitted to the App Store include a link to the app developer’s own privacy policy.

This is a big change as until now only subscription-based apps needed to supply this information – and it also extends to the privacy policy itself, which Apple insists must be clear and explicitly in explaining:

To read this article in full, please click here

Read More