{"id":12816,"date":"2018-07-16T12:40:58","date_gmt":"2018-07-16T20:40:58","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/16\/news-6583\/"},"modified":"2018-07-16T12:40:58","modified_gmt":"2018-07-16T20:40:58","slug":"news-6583","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/16\/news-6583\/","title":{"rendered":"A week in security (July 9 \u2013 July 15)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Jul 2018 15:00:01 +0000<\/strong><\/p>\n<p>Last week, we talked about <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/iot-domestic-abuse-can-stop\/\" target=\"_blank\" rel=\"noopener\">domestic abuse fuelled by IoT<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/07\/youve-asked-start-threat-intel-program\/\" target=\"_blank\" rel=\"noopener\">doing threat intel programs right<\/a>, blocking <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/07\/block-all-or-nothing-to-prevent-ico-fraud\/\" target=\"_blank\" rel=\"noopener\">ICO fraud<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/07\/when-three-isnt-a-crowd-man-in-the-middle-mitm-attacks-explained\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle attacks<\/a>. We also explained <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/we-block-shady-ad-blockers\/\" target=\"_blank\" rel=\"noopener\">why we block shady ad blockers<\/a> and provided <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/07\/primer-stay-safe-amazons-prime-day-sale\/\" target=\"_blank\" rel=\"noopener\">tips to online shoppers for Prime Day<\/a>.<\/p>\n<h3>Other news:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2018\/07\/09\/android-devices-with-pre-installed-malware\/\" target=\"_blank\" rel=\"noopener\">Reports revealed<\/a> that low-end Android devices sold in Egypt, Brazil, South Africa, Myanmar, and other developing markets contain pre-installed malware. (Source: Help Net Security)<\/li>\n<li>The breach in Ticketmaster was found to be <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/ticketmaster-breach-part-of-massive-payment-card-hacking-campaign\/d\/d-id\/1332266\" target=\"_blank\" rel=\"noopener\">part of a larger card fraud campaign<\/a>. (Source: Dark Reading)<\/li>\n<li>Significant <a href=\"https:\/\/www.csoonline.com\/article\/3287918\/security\/microsoft-related-bug-reports-up-121-virtualization-software-bugs-up-275.html\" target=\"_blank\" rel=\"noopener\">increases in Microsoft and virtualization software bugs<\/a> seen. (Source: CSO Online)<\/li>\n<li>Two <a href=\"https:\/\/www.zdnet.com\/article\/the-return-of-spectre\/\" target=\"_blank\" rel=\"noopener\">new Spectre-style CPU attacks<\/a> uncovered by researchers. (Source: ZDNet)<\/li>\n<li>Sextortion is in the news once again, and scammers behind it get the attention of their targets by <a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/sextortion-scam-uses-recipients-hacked-passwords\/\" target=\"_blank\" rel=\"noopener\">revealing old passwords tied to their account<\/a>. (Source: KrebsOnSecurity)<\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2018\/07\/13\/global-cryptomining-attacks\/\" target=\"_blank\" rel=\"noopener\">Almost half of organizations worldwide<\/a> were hit by crypto mining attacks, report says. (Source: Help Net Security)<\/li>\n<li>Researchers from the Oxford Internet Institute revealed that <a href=\"https:\/\/techcrunch.com\/2018\/07\/13\/researchers-find-that-filters-dont-prevent-porn\/\" target=\"_blank\" rel=\"noopener\">Internet filters rarely keep adolescent kids away from adult entertainment material<\/a>. (Source: TechCrunch)<\/li>\n<li>A Chrome extension allowed marketers <a href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3035843\/facebook-privacy-loophole-allowed-personal-data-of-closed-group-members-to-be-downloaded\" target=\"_blank\" rel=\"noopener\">to access sensitive data of Facebook<\/a> users in closed groups. (Source: Computing)<\/li>\n<li>A <a href=\"https:\/\/blog.talosintelligence.com\/2018\/07\/Mobile-Malware-Campaign-uses-Malicious-MDM.html\" target=\"_blank\" rel=\"noopener\">mobile malware campaign in India<\/a> was found to use an open-source mobile device management (MDM) system to take over devices. (Source: Talos Intelligence)<\/li>\n<li>The <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/data-breaches-at-timehop-macys-highlight-need-for-multi-factor-authentication\/d\/d-id\/1332250\" target=\"_blank\" rel=\"noopener\">importance of multi-factor authentication<\/a> highlighted in recent breaches concerning Timehop and Macy&#8217;s. (Source: Dark Reading)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-9-july-15\/\">A week in security (July 9 \u2013 July 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-9-july-15\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Jul 2018 15:00:01 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-9-july-15\/' title='A week in security (July 9 \u2013 July 15)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the security news from July 9 &#8211; July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-blockers\/\" rel=\"tag\">ad blockers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-malware\/\" rel=\"tag\">android malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crypto-mining\/\" rel=\"tag\">crypto mining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domestic-abuse\/\" rel=\"tag\">domestic abuse<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ico-fraud\/\" rel=\"tag\">ico fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mitm\/\" rel=\"tag\">mitm<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/multi-factor-authentication\/\" rel=\"tag\">multi-factor authentication<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/prime-day-2018\/\" rel=\"tag\">prime day 2018<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spectre\/\" rel=\"tag\">Spectre<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-intel\/\" rel=\"tag\">Threat Intel<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-9-july-15\/' title='A week in security (July 9 \u2013 July 15)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2018\/07\/week-security-july-9-july-15\/\">A week in security (July 9 \u2013 July 15)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18910,11254,15343,11172,10207,3589,18963,16785,11738,18974,10497,17082,11143,10498],"class_list":["post-12816","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-blockers","tag-android-malware","tag-crypto-mining","tag-data-breach","tag-domestic-abuse","tag-facebook","tag-ico-fraud","tag-mitm","tag-multi-factor-authentication","tag-prime-day-2018","tag-security-world","tag-spectre","tag-threat-intel","tag-week-in-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12816"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12816\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}