{"id":12699,"date":"2018-06-29T06:00:06","date_gmt":"2018-06-29T14:00:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/29\/news-6467\/"},"modified":"2018-06-29T06:00:06","modified_gmt":"2018-06-29T14:00:06","slug":"news-6467","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/06\/29\/news-6467\/","title":{"rendered":"This Week in Security News: Rules and Regulation"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 29 Jun 2018 13:39:07 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, House lawmakers approved legislation for securing technology used to power critical infrastructures from cyberattacks.<\/p>\n<p>Read on to learn more.<strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-new-face-of-necurs-noteworthy-changes-to-necurs-behaviors\/\"><strong>The New Face of Necurs: Noteworthy Changes to Necurs\u2019 Behaviors<\/strong><\/a><\/p>\n<p><em>Six years after it was first spotted in the wild, the Necurs malware botnet is still out to prove that it\u2019s a malware chameleon.\u00a0 We recently discovered noteworthy changes to the way Necurs makes use of its bots, such as pushing infostealers on them and showing a special interest in bots with specific characteristics.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-bot-targets-devices-with-running-ssh-service-via-potential-scam-site\/\"><strong>Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site<\/strong><\/a><\/p>\n<p><em>The practicality of cryptocurrency mining on devices connected to the internet of things (IoT) is often a questionable matter in terms of computing power. Be that as it may, we\u2019ve nonetheless seen miscreants targeting connected devices and even offering cryptocurrency malware in the underground.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/online-privacy\/digging-into-the-new-eprivacy-regulation-balancing-privacy-and-progress\"><strong>Digging into the New ePrivacy Regulation: Balancing Privacy and Progress<\/strong><\/a><\/p>\n<p><em>After GDPR\u2019s implementation, discussions have not waned as enterprises anticipate the impact of a proposed legislation to secure electronic communications \u2014 the ePrivacy Regulation (ePR).<\/em><\/p>\n<p><a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/394079-house-passes-bill-to-addressing-industrial-cybersecurity\"><strong>House Passes Bill to Addressing Industrial Cybersecurity<\/strong><\/a><\/p>\n<p><em>House lawmakers approved legislation that aims at securing technology used to power critical infrastructure from cyberattacks.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/hospitality-industry-under-attack-for-credentials-pii-theft\"><strong>Hospitality Industry Under Attack for Credentials, PII Theft<\/strong><\/a><\/p>\n<p><em>The study found that fake accounts and intrusions via botnets targeting hotel, airline, cruise, and travel websites have increased in particular countries.<\/em><\/p>\n<p><a href=\"https:\/\/www.pymnts.com\/news\/security-and-risk\/2018\/black-hat-gdpr-data-breach-cryptocurrency\/\"><strong>Black Hat: Cybersecurity Is More Than A Tech Problem<\/strong><\/a><\/p>\n<p><em>A recent report by Black Hat on the current state of cybersecurity shows how experts are bundling issues such as personal privacy, politics, business, ethics and risk into the overall cybersecurity package. <\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/online-privacy\/voice-data-of-5-1-million-people-collected-and-stored-by-uk-tax-authority\"><strong>Voice Data of 5.1 Million People Collected and Stored by UK Tax Authority<\/strong><\/a><\/p>\n<p><em>The U.K. privacy advocate group Big Brother Watch published a report about the biometric data \u2014 specifically voice data \u2014 collection practices of HM Revenue and Customs (HMRC).<\/em><\/p>\n<p><a href=\"https:\/\/www.itproportal.com\/news\/a-quarter-of-uk-businesses-think-their-cybersecurity-isnt-up-to-scratch\/\"><strong>A Quarter of UK Businesses Think Their Cybersecurity Isn&#8217;t Up to Scratch<\/strong><\/a><\/p>\n<p><em>A report recently released by the London Office for Rapid Cybersecurity Advancement shows that more than half of UK\u2019s large businesses have suffered a cybersecurity attack in the past 12 months.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/phishing-emails-sidestep-microsoft-office-365-filters-using-zerofont\"><strong>Phishing Emails Sidestep Microsoft Office 365 Filters Using ZeroFont<\/strong><\/a><\/p>\n<p><em>The technique, called ZeroFont, involves the manipulation of text font sizes to trick O365\u2019s natural language processing, a tool that identifies malicious emails.<\/em><\/p>\n<p>Do you think the new House bill will help successfully mitigate threats to cybersecurity for critical infrastructure technology? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-rules-and-regulation\/\">This Week in Security News: Rules and Regulation<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-rules-and-regulation\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 29 Jun 2018 13:39:07 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, House lawmakers approved legislation for securing technology used to power critical infrastructures from cyberattacks. Read on to learn more.\u00a0 The New Face of Necurs: Noteworthy Changes to&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-rules-and-regulation\/\">This Week in Security News: Rules and Regulation<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,18878,12116,18879,11977,18880,18881],"class_list":["post-12699","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-eprivacy-regulation-epr","tag-gdpr","tag-hm-revenue-and-customs-hmrc","tag-necurs","tag-rules-and-regulation","tag-zerofont"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12699"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12699\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}