{"id":12411,"date":"2018-05-28T13:10:12","date_gmt":"2018-05-28T21:10:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/28\/news-6180\/"},"modified":"2018-05-28T13:10:12","modified_gmt":"2018-05-28T21:10:12","slug":"news-6180","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/05\/28\/news-6180\/","title":{"rendered":"A week in security (May 21 \u2013 May 27)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 28 May 2018 20:26:03 +0000<\/strong><\/p>\n<p>Last week we told you about a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/\" target=\"_blank\" rel=\"noopener\">Mac cryptominer using XMRig<\/a>, an <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/happy-anniversary-dreamcast-scams\/\" target=\"_blank\" rel=\"noopener\">overview of Dreamcast related scams<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/malware-analysis-decoding-emotet-part-1\/\" target=\"_blank\" rel=\"noopener\">part 1 of decoding Emotet<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/bad-code-wont-die-7-ways-kill\/\" target=\"_blank\" rel=\"noopener\">what to do about bad coding habits that die hard<\/a>.<\/p>\n<p>We also published the <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/05\/malwarebytes-crackme-2-contest-summary\/\" target=\"_blank\" rel=\"noopener\">results of our second CrackMe contest<\/a>.<\/p>\n<h3>Other news<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2018\/05\/machine-learning-is-stuck-on-asking-why\/560675\/\" target=\"_blank\" rel=\"noopener\">How a pioneer of machine learning became one of its sharpest critics<\/a>. (Source: The Atlantic)<\/li>\n<li>The <a href=\"https:\/\/www.nytimes.com\/interactive\/2018\/05\/03\/magazine\/money-issue-iowa-lottery-fraud-mystery.html\" target=\"_blank\" rel=\"noopener\">man who cracked the lottery<\/a>. Spoiler: it was an inside job. (Source: The New York Times Magazine)<\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2018\/05\/fourth-critical-spectre-cpu-flaw.html\" target=\"_blank\" rel=\"noopener\">New Spectre (variant 4) CPU flaw discovered<\/a> \u2014Intel, ARM, AMD affected (Source: The Hacker News)<\/li>\n<li><a href=\"https:\/\/abcnews.go.com\/Technology\/wireStory\/aclu-amazon-sell-face-recognition-tech-police-55351083\" target=\"_blank\" rel=\"noopener\">Amazon urged not to sell facial recognition tool to police<\/a>. (Source: ABC News)<\/li>\n<li>Does the <a href=\"https:\/\/www.theregister.co.uk\/2018\/05\/22\/facebook_data_leak_no_account\/\" target=\"_blank\" rel=\"noopener\">Facebook app even spy on those who don\u2019t have an account<\/a>? (Source: The Register)<\/li>\n<li>FBI stats:<a href=\"https:\/\/www-mailguard-com-au.cdn.ampproject.org\/c\/s\/www.mailguard.com.au\/blog\/fbi-fraud-1-cybercrime?hs_amp=true\" target=\"_blank\" rel=\"noopener\"> email fraud still #1 cybercrime<\/a>. (Source: MailGuard Blog )<\/li>\n<li><a href=\"https:\/\/www.scmagazine.com\/that-smarts-brain-food-spam-botnet-malware-found-on-thousands-of-websites\/article\/768030\/\" target=\"_blank\" rel=\"noopener\">Brain Food spam botnet malware found on thousands of websites<\/a>. (Source: SCMagazine)<\/li>\n<li>Amazon Alexa Security &#8211; <a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2018\/05\/25\/amazon-alexa-security-how-secure-are-voice-assistants-and-how-can-you-protect-yourself\/#2b537e823734\" target=\"_blank\" rel=\"noopener\">How to stop hacks on voice assistants<\/a>. (Source: Forbes)<\/li>\n<li><a href=\"https:\/\/myonlinesecurity.co.uk\/necurs-delivering-flawed-ammy-rat-via-iqy-excel-web-query-files\/\" target=\"_blank\" rel=\"noopener\">Necurs delivering flawed Ammy RAT via IQY Excel Web Query files<\/a>. (Source: MyOnlineSecurity)<\/li>\n<li>Researchers from Columbia University have created a technique named <a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/fontcode-technique-can-hide-secret-messages-inside-font-glyphs\/\" target=\"_blank\" rel=\"noopener\">FontCode<\/a> that can be used to embed hidden messages inside font glyphs (characters). (Source: Bleeping Computer)<\/li>\n<\/ul>\n<h3>News about the Russian \u201crouter botnet\u201d<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.enterprisetimes.co.uk\/2018\/05\/25\/will-vpnfilter-attack-disrupt-champions-league-final\/\" target=\"_blank\" rel=\"noopener\">Will VPNFilter attack disrupt Champions League final?<\/a> (Source: Enterprise Times)<\/li>\n<li><a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-actions-disrupt-advanced-persistent-threat-28-botnet-infected\" target=\"_blank\" rel=\"noopener\">Justice Department announces actions to disrupt APT 28 Botnet of Infected routers and network storage devices<\/a>. (Source: US Department if Justice)<\/li>\n<li><a href=\"https:\/\/www.thedailybeast.com\/exclusive-fbi-seizes-control-of-russian-botnet\" target=\"_blank\" rel=\"noopener\">FBI seizes control of Russian Botnet<\/a>. (Source: The Daily Beast)<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-tells-router-users-to-reboot-now-to-kill-malware-infecting-500k-devices\/\" target=\"_blank\" rel=\"noopener\">FBI tells router users to reboot now to kill malware infecting 500k devices<\/a>. (Source: ArsTechnica)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/week-security-may-21-may-27\/\">A week in security (May 21 \u2013 May 27)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/week-security-may-21-may-27\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 28 May 2018 20:26:03 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/week-security-may-21-may-27\/' title='A week in security (May 21 \u2013 May 27)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of security news from May 21 \u2013 May 27, including Mac cryptominer, the results of the crackme, bad coding habits, Emotet analysis, and much more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bad-coding-habits\/\" rel=\"tag\">bad coding habits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crackme\/\" rel=\"tag\">crackme<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dreamcast\/\" rel=\"tag\">dreamcast<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/russian-router-botnet\/\" rel=\"tag\">russian router botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vpnfilter\/\" rel=\"tag\">vpnfilter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/xmrig\/\" rel=\"tag\">XMRig<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/week-security-may-21-may-27\/' title='A week in security (May 21 \u2013 May 27)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/week-security-may-21-may-27\/\">A week in security (May 21 \u2013 May 27)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18504,16539,18515,15715,18544,10497,18514,10498,18493],"class_list":["post-12411","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bad-coding-habits","tag-crackme","tag-dreamcast","tag-emotet","tag-russian-router-botnet","tag-security-world","tag-vpnfilter","tag-week-in-security","tag-xmrig"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12411"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12411\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}