{"id":14023,"date":"2018-12-07T09:00:03","date_gmt":"2018-12-07T17:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/07\/news-7790\/"},"modified":"2018-12-07T09:00:03","modified_gmt":"2018-12-07T17:00:03","slug":"news-7790","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/12\/07\/news-7790\/","title":{"rendered":"This Week in Security News: Security and Privacy Issues"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Dec 2018 15:03:46 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.\u00a0This week, understand how Trend\u00a0Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Deep Security<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>\u00a0service will be integrating with AWS Security Hub<em>. <\/em>Also, learn how to prevent risks and secure machine-to-machine communications over Message Queuing Telemetry Transport and Constrained Application Protocol.<\/p>\n<p>Read on:<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/aws-security-hub-and-deep-security\/\">AWS Security Hub and Deep Security<\/a><\/strong><\/p>\n<p><em>AWS Security Hub provides a comprehensive view of your high priority security alerts and compliance status for your AWS deployment.\u00a0\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/marriott-says-data-breach-compromised-info-500-million-guests-n942041\">Marriott Says Breach of Starwood Guest Database Compromised Info of Up to 500 Million<\/a><\/strong><\/p>\n<p><em>Marriott International announced that the private information of up to 500 million guests may have been accessed as part of a breach of its Starwood guest reservation database.<\/em><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/machine-to-machine-m2m-technology-design-issues-and-implementation-vulnerabilities\/\">Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities<\/a><\/strong><\/p>\n<p><em>Trend Micro found hundreds of thousands of misconfigured hosts that exposed credentials, sensitive information, and industry-related process data.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.cbc.ca\/news\/politics\/cybercrime-internet-security-attacks-1.4934409\">Cyber crooks increasingly targeting home devices: report<\/a><\/strong><\/p>\n<p><em>Cyber criminals are shifting their attention from traditional computers to internet-connected devices in Canadian homes, says the government&#8217;s cyber security agency.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/quora-discloses-mega-breach-impacting-100-million-users\/?mid=1\">Quora Discloses Mega Breach Impacting 100 Million Users<\/a><\/strong><\/p>\n<p><em>Quora, one of the largest question-and-answer portals on the Internet, announced that hackers gained access to its servers and stole information on about 100 million of its users, which is approximately half of the site&#8217;s total userbase.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/hacker-infects-node-js-package-to-steal-from-bitcoin-wallets\">Hacker Infects Node.js Package to Steal from Bitcoin Wallets<\/a><\/strong><\/p>\n<p><em>A Node.js module with nearly two million downloads a week was compromised after the library was injected with malicious code programmed to steal bitcoins in wallet apps.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/mqtt-and-coap-security-and-privacy-issues-in-iot-and-iiot-communication-protocols\">MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols<\/a><\/strong><\/p>\n<p><em>Trend Micro looked into MQTT brokers and CoAP servers around the world to assess IoT protocol security and ways to prevent risks and secure machine-to-machine (M2M) communications over MQTT and CoAP.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.politico.com\/story\/2018\/12\/04\/exclusive-emails-of-top-nrcc-officials-stolen-in-major-2018-hack-1043309\">Exclusive: Emails of Top NRCC Officials Stolen in Major 2018 Hack<\/a><\/strong><\/p>\n<p><em>The House GOP campaign arm suffered a major hack during the 2018 midterm campaigns, exposing thousands of sensitive emails to an outside intruder, according to three senior party officials.\u00a0<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2018\/12\/06\/smart-cities-could-these-iot-design-flaws-put-the-lights-out\/#65db893c1c4c\">Smart Cities: Could These IoT Design Flaws Put The Lights Out?<\/a><\/strong><\/p>\n<p><em>Trend Micro discovered that two popular IoT protocols are insecure by design, putting both &#8216;Industry 4.0&#8217; smart factory implementations and smart cities at risk.<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/spam-campaign-with-pub-attachment-delivers-rat-targets-food-and-retail-brands\">Spam Campaign with .PUB Attachment Delivers RAT, Targets Food and Retail Brands<\/a><\/strong><\/p>\n<p><em>The cybercriminals behind this spam campaign may be taking advantage of using .PUB files as the macro-downloader during the busiest quarter of the year for businesses according to Trend Micro.<\/em><\/p>\n<p>Were you excited about AWS\u2019s Security Hub announcement? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-and-privacy-issues\/\">This Week in Security News: Security and Privacy Issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-and-privacy-issues\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Dec 2018 15:03:46 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.\u00a0This week, understand how Trend\u00a0Micro&#x2122; Deep Security&#x2122;\u00a0service will be integrating with AWS Security Hub. Also, learn how to prevent risks and secure machine-to-machine communications over Message Queuing Telemetry Transport and&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-security-and-privacy-issues\/\">This Week in Security News: Security and Privacy Issues<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,714],"class_list":["post-14023","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14023"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14023\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}