{"id":12204,"date":"2018-05-04T06:00:18","date_gmt":"2018-05-04T14:00:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/04\/news-5973\/"},"modified":"2018-05-04T06:00:18","modified_gmt":"2018-05-04T14:00:18","slug":"news-5973","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/05\/04\/news-5973\/","title":{"rendered":"This Week in Security News: Zippy\u2019s and Flynn"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 May 2018 13:00:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Hawaii-based restaurant Zippy\u2019s suffered a POS data breach. In addition, Uber executive John Flynn argued that user expectations on data protection are rising, but consumers still aren\u2019t implementing the right precautions for their own data safety.<\/p>\n<p>Read on to learn more.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/blog.trendmicro.com\/state-of-the-art-security-the-role-of-technology-in-the-journey-to-gdpr-compliance\/\"><strong>State-of-the-Art Security: The Role of Technology in the Journey to GDPR Compliance<\/strong><\/a><\/p>\n<p><em>As we\u2019ve discussed over the last 7 weeks in our video case study <\/em><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/capabilities\/solutions-for\/gdpr-compliance\/video-case-study.html\"><em>series<\/em><\/a><em>, the GDPR impacts many different areas of our company, including our employees, customers, and partners.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/protecting-your-privacy-part-1-the-privacy-risks-of-social-networks-and-online-browsing\/\"><strong>PROTECTING YOUR PRIVACY \u2013 Part 1: The Privacy Risks of Social Networks and Online Browsing<\/strong><\/a><\/p>\n<p><em>Most Americans today spend many of their waking hours online. In fact, we\u2019re up to spending an average of five hours per day just on our mobiles.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/what-hipaa-and-other-compliance-teaches-us-about-the-reality-of-gdpr\/\"><strong>What HIPAA and Other Compliance Teaches Us About the Reality of GDPR<\/strong><\/a><\/p>\n<p><em>The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/protecting-your-privacy-part-2-how-to-maximize-your-privacy-on-social-media-and-in-your-browser\/\"><strong>PROTECTING YOUR PRIVACY \u2013 Part 2: How to Maximize Your Privacy on Social Media and in Your Browser<\/strong><\/a><\/p>\n<p><em>You can manually configure your Privacy Settings on sites including Facebook, Twitter, LinkedIn, and more. However, no two sites are the same, and some are easier than others to navigate.<\/em><em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-the-connected-industrial-world-with-trend-micro\/\"><strong>Securing the Connected Industrial World with Trend Micro<\/strong><\/a><\/p>\n<p><em>At Trend Micro we\u2019ve made it our business over the past 30 years to anticipate where technology is taking the world. That\u2019s why our message has evolved over that time from<\/em> <em>Peace of Mind Computing<\/em> to <em>Your Internet Firewall<\/em> and most recently <em>Securing Your Journey to the Cloud<\/em>.<\/p>\n<div class=\"post-head\">\n<div class=\"post-title\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/facexworm-targets-cryptocurrency-trading-platforms-abuses-facebook-messenger-for-propagation\/\">FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation<\/a><\/strong><\/p>\n<p><em>Trend Micro&#8217;s Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger.\u00a0\u00a0<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-cryptocurrency-is-shaping-todays-threat-environment\/\"><strong>How cryptocurrency is shaping today\u2019s threat environment<\/strong><\/a><\/p>\n<p><em>Cryptocurrency has exploded as a popular way to support digital transactions. Since its creation, users have discovered an array of different ways to leverage cryptocurrency, including within mining strategies and digital wallets.<\/em><strong>\u00a0<\/strong><\/p>\n<div class=\"post-head\">\n<div class=\"post-title\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-targeting-iot-being-offered-in-the-underground\/\">Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground<\/a><\/strong><\/p>\n<p><em>Cryptocurrencies have been generating much buzz of late. While\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-03-26\/what-the-world-s-governments-are-saying-about-cryptocurrencies\" target=\"_blank\" rel=\"noopener\">some<\/a>\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/d358zk\/canada-is-gearing-up-to-regulate-cryptocurrency-parliament-hearing\" target=\"_blank\" rel=\"noopener\">governments<\/a>\u00a0are at work to regulate transactions involving them, there are others that want to\u00a0<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xk4e4\/bitcoin-ban-plattsburgh-coinmint-mining\" target=\"_blank\" rel=\"noopener\">stop mining activities<\/a>\u00a0related to them altogether.\u00a0\u00a0<\/em><\/p>\n<div class=\"post-head\">\n<div class=\"post-title\">\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/legitimate-application-anydesk-bundled-with-new-ransomware-variant\/\">Legitimate Application AnyDesk Bundled with New Ransomware Variant<\/a><\/strong><\/p>\n<p><em>Trend Micro recently discovered a new ransomware (Detected as RANSOM_BLACKHEART.THDBCAH), which drops and executes the legitimate tool known as AnyDesk alongside its malicious payload.\u00a0\u00a0<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.scmagazine.com\/zippys-restaurants-suffers-pos-data-breach\/article\/762902\/\"><strong>Zippy&#8217;s Restaurants Suffers POS Data Breach<\/strong><\/a><\/p>\n<p><em>Zippy&#8217;s Restaurants\u2019 point-of-sale system was compromised for four months, exposing customer data. <\/em><\/p>\n<p><a href=\"https:\/\/thediplomat.com\/2018\/05\/asean-cybersecurity-in-the-spotlight-under-singapores-chairmanship\/\"><strong>ASEAN Cybersecurity in the Spotlight Under Singapore\u2019s Chairmanship<\/strong><\/a><\/p>\n<p><em>At ASEAN Summit 2018 in Singapore, the strong focus on cybersecurity reflected regional and international attention to growing cyber threats in Southeast Asia.<\/em><\/p>\n<p><a href=\"https:\/\/www.independent.co.uk\/news\/uk\/home-news\/uk-businesses-cyber-attacks-security-breach-figures-fraud-hackers-government-report-a8321931.html\"><strong>Almost Half of UK Businesses Suffered Cyberattack or Security Breach Last Year, Figures Show<\/strong><\/a><\/p>\n<p><em>The 2018 Cyber Security Breaches Survey found 19 percent of charities and 43 percent of businesses in the UK had reported cyber security breaches or attacks in the last year.<\/em><\/p>\n<p><a href=\"http:\/\/fortune.com\/2018\/05\/02\/facebook-cambridge-analytica-scandal-states-data-security\/\"><strong>Commentary: States Are Getting Tough on Data Security\u2014but That Might Be a Problem<\/strong><\/a><\/p>\n<p><em>The Facebook-Cambridge Analytica scandal shines a light on the need for more regulation protecting data; more than 240 bills were introduced in 42 states last year covering a range of security issues.<\/em><\/p>\n<p><a href=\"http:\/\/observer.com\/2018\/05\/uber-data-breach-collision\/\"><strong>Uber Security Head Says Users Need to Care More About Data After Breach<\/strong><\/a><\/p>\n<p><em>At the 2018 Collision Tech Conference, John Flynn relayed that user expectations on data protection are rising, but customers still aren\u2019t taking the right actions to protect their personal information.<\/em><strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/alexa-can-listen-indefinitely-potentially-exploited-to-transcribe-information-to-cybercriminals\">Alexa Can Listen Indefinitely, Potentially Exploited to Transcribe Information to Cybercriminals<\/a><\/strong><\/p>\n<p><em>Researchers discovered a new\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/threat-intelligence-center\/internet-of-things\/\">internet of things (IoT)<\/a>\u00a0design flaw in a popular\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/google-home-mini-speaker-discovered-eavesdropping-on-home-user\">smart home system<\/a>: They found that Amazon\u2019s Alexa service can be programmed to\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/amazons-alexa-could-be-tricked-into-snooping-on-users-say-security-researchers\/#ftag=RSSbaffb68\">eavesdrop<\/a>on its users and transcribe all the information heard.\u00a0\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/securing-the-internet-of-things-through-effective-regulation\"><strong>Securing the Internet of Things Through Effective Regulation<\/strong><\/a><\/p>\n<p><em>According to a survey done by Gartner, almost 20 percent of organizations have observed at least one IoT-based attack in the last three years.<\/em><\/p>\n<p class=\"c-page-title\"><strong><a href=\"https:\/\/www.curbed.com\/2018\/4\/18\/17254382\/hack-hackers-smart-city-cybersecurity\">As cities get high-tech, hackers become more dangerous<\/a><\/strong><\/p>\n<p id=\"FHlijs\"><em>Remember when a major U.S. city\u2019s computer infrastructure was hacked, and held ransom, by a group of cyber criminals?<\/em><\/p>\n<p><span style=\"color: #000000\">Do you agree with John Flynn\u2019s speech on user expectations for data pro<\/span>tection? Share your thoughts in the comments below or follow me on Twitter to continue the conversation; <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-zippys-and-flynn\/\">This Week in Security News: Zippy\u2019s and Flynn<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-zippys-and-flynn\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 May 2018 13:00:12 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Hawaii-based restaurant Zippy\u2019s suffered a POS data breach. In addition, Uber executive John Flynn argued that user expectations on data protection are rising, but consumers still aren\u2019t&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-zippys-and-flynn\/\">This Week in Security News: Zippy\u2019s and Flynn<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[17876,11052,10422,11063,18307,12116,10495,5897],"class_list":["post-12204","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cambridge-analytica","tag-cryptocurrency","tag-current-news","tag-data-privacy","tag-facexworm","tag-gdpr","tag-iot","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12204"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12204\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}