{"id":11719,"date":"2018-03-12T10:10:02","date_gmt":"2018-03-12T18:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/12\/news-5489\/"},"modified":"2018-03-12T10:10:02","modified_gmt":"2018-03-12T18:10:02","slug":"news-5489","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/12\/news-5489\/","title":{"rendered":"A week in security (March 05 \u2013 March 11)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 12 Mar 2018 17:36:16 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs, we <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/international-womens-day-women-in-tech-share-their-stories\/\" target=\"_blank\" rel=\"noopener\">paid homage<\/a> to several women in tech, including some of our very own, on International Women&#8217;s Day and shared their stories.<\/p>\n<p>We also looked into an <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/03\/mobile-menace-monday-olympics-app-has-more-ads-than-games\/\" target=\"_blank\" rel=\"noopener\">adware posing as an Android app<\/a> that claims to live stream the 2018 Winter Olympics, exposed scammers that go by the name GeeksHelp, who were <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/03\/same-tech-support-scammers-caught-again-two-years-later\/\" target=\"_blank\" rel=\"noopener\">caught red-handed (again)<\/a> after their first unmasking two years before, and gave you the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/encryption-101-how-to-break-encryption\/\" target=\"_blank\" rel=\"noopener\">steps on how to break encryption<\/a>.<\/p>\n<p>Lastly, we spotlighted the <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">impact of artificial intelligence (AI) and machine learning (ML) in cybersecurity<\/a>, the <a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/03\/building-an-incident-response-program-creating-the-framework\/\" target=\"_blank\" rel=\"noopener\">importance of having a solid and tested incident response framework<\/a>, and the <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/03\/the-state-of-mac-malware\/\" target=\"_blank\" rel=\"noopener\">reality that Mac malware <em>does<\/em> exist<\/a> and that they have evolved.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li>Avid Twitter, Facebook, and Instagram user? Be wary of clicking links in your feed, as <a href=\"https:\/\/securitybrief.com.au\/story\/social-media-phishing-rise-as-attackers-experiment-tactics\/\" target=\"_blank\" rel=\"noopener\">phishing campaigns are seen on the rise in social media platforms<\/a>. (Source: Security Brief)<\/li>\n<li>Inexpensive Android smartphone models were <a href=\"https:\/\/www.securityweek.com\/triada-trojan-pre-installed-low-cost-android-smartphones\" target=\"_blank\" rel=\"noopener\">pre-installed with the Triada Trojan<\/a>, one of several advanced mobile malware in the wild. (Source: Security Week)<\/li>\n<li><a href=\"https:\/\/www.scmagazineuk.com\/hospitality-industry-is-key-infosec-battleground\/article\/748908\/\" target=\"_blank\" rel=\"noopener\">Nation-state threat actors have set their sights on the hospitality industry.<\/a> Not only is the vertical vulnerable, but targets can also be tracked while they travel. (Source: SC Magazine UK)<\/li>\n<li>Speaking of travel, according to a data security engineer, airline companies were found to <a href=\"https:\/\/www.fastcompany.com\/40539409\/the-data-you-give-airlines-may-not-be-as-secure-as-you-think\" target=\"_blank\" rel=\"noopener\">hand over passenger information to marketers and hackers<\/a>. (Source: Fast Company)<\/li>\n<li>Own an IoT device at home? <a href=\"https:\/\/threatpost.com\/iot-security-disconnect-as-attacks-spike-device-patching-still-lags\/130266\/\" target=\"_blank\" rel=\"noopener\">Keep an eye on them<\/a>, and update apps and firmware once available. (Source: Threatpost)<\/li>\n<li>Did you know that <a href=\"https:\/\/www.exabeam.com\/security\/criminals-can-build-web-dossier-browser\/\" target=\"_blank\" rel=\"noopener\">hackers can create a dossier<\/a> about users based on the information stored on their web browsers? (Source: The ExaBlog)<\/li>\n<li>Really, Facebook, should you even be asking <a href=\"https:\/\/www.thetimes.co.uk\/edition\/news\/should-we-permit-child-grooming-asks-facebook-ghsm6n2w3\" target=\"_blank\" rel=\"noopener\"><em>this<\/em><\/a>? (Source: The Times)<\/li>\n<li>The takedown of AlphaBay and Hansa <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/dark-web-experts-id-fraudsters\/\" target=\"_blank\" rel=\"noopener\">has little effect on Dark Web communities<\/a> in carding and identity theft. (Source: InfoSecurity Magazine)<\/li>\n<li>Cyberextortion is in every threat actor&#8217;s repertoire, and <a href=\"https:\/\/sdtimes.com\/security\/cyberextortion-growing-internet-problem\/\" target=\"_blank\" rel=\"noopener\">it&#8217;s on the uptick<\/a>, thanks to the growth of crime-as-a-service in the criminal underground. (Source: SD Times)<\/li>\n<li>KrebsOnSecurity homed in on <a href=\"https:\/\/krebsonsecurity.com\/2018\/03\/look-alike-domains-and-visual-confusion\/\" target=\"_blank\" rel=\"noopener\">Punycode and look-alike characters<\/a> in domain names. If this is the first time you encounter these, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\" target=\"_blank\" rel=\"noopener\">attacks taking advantage of the confusion isn&#8217;t new<\/a>. (Source: KrebsOnSecurity)<\/li>\n<li>Microsoft saved everyone a lot of headaches after <a href=\"http:\/\/www.zdnet.com\/article\/windows-security-microsoft-fights-massive-cryptocoin-miner-malware-outbreak\/\" target=\"_blank\" rel=\"noopener\">successfully blocking a malware campaign<\/a> that would have allowed half-a-million devices to become miners. (Source: ZDNet)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-05-march-11\/\">A week in security (March 05 \u2013 March 11)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-05-march-11\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 12 Mar 2018 17:36:16 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-05-march-11\/' title='A week in security (March 05 \u2013 March 11)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of notable security news from March 5 to 11, including another takedown of GeekHelp tech support scammers, a lame Android app, AI and ML in cybersecurity, Mac malware, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/artificial-intelligence\/\" rel=\"tag\">artificial intelligence<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/encryption\/\" rel=\"tag\">encryption<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/international-womens-day\/\" rel=\"tag\">international women&#8217;s day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/machine-learning\/\" rel=\"tag\">machine learning<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/recap\/\" rel=\"tag\">recap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-blog-roundup\/\" rel=\"tag\">weekly blog roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/women-in-tech\/\" rel=\"tag\">women in tech<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-05-march-11\/' title='A week in security (March 05 \u2013 March 11)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/03\/a-week-in-security-march-05-march-11\/\">A week in security (March 05 \u2013 March 11)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,11113,10439,17733,12038,10503,10497,10498,10506,17634],"class_list":["post-11719","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-artificial-intelligence","tag-encryption","tag-international-womens-day","tag-machine-learning","tag-recap","tag-security-world","tag-week-in-security","tag-weekly-blog-roundup","tag-women-in-tech"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11719"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11719\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}