{"id":14745,"date":"2019-03-04T11:10:03","date_gmt":"2019-03-04T19:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/04\/news-8494\/"},"modified":"2019-03-04T11:10:03","modified_gmt":"2019-03-04T19:10:03","slug":"news-8494","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/04\/news-8494\/","title":{"rendered":"A week in security (February 25 \u2013 March 3)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 04 Mar 2019 18:03:33 +0000<\/strong><\/p>\n<p>Last week, we delved into the realm of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/k-12-schools-need-shore-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">K-12 schools and security<\/a>, explored the world of compromised websites and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-golang-brute-forcer-discovered-amid-rise-e-commerce-attacks\/\" target=\"_blank\" rel=\"noopener\">Golang bruteforcers<\/a>, and examined the possible realms of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/02\/will-pay-privacy-new-normal\/\" target=\"_blank\" rel=\"noopener\">pay for privacy<\/a>. We also looked at <a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/02\/key-considerations-building-vs-buying-identity-access-management-solutions\/\" target=\"_blank\" rel=\"noopener\">identity management solutions<\/a>, Google\u2019s <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/spectre-google-universal-read-gadget\/\" target=\"_blank\" rel=\"noopener\">Universal Read Gadget<\/a>, and did the deepest of dives into the life of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/02\/max-schrems-lawyer-regulator-international-man-of-privacy\/\" target=\"_blank\" rel=\"noopener\">Max Schrems<\/a>.<\/p>\n<h3>Other security news<\/h3>\n<ul>\n<li>Big coin, big<span class=\"Apple-converted-space\">\u00a0 <\/span>problems: Founder of My Big Coin <a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/28\/cryptocurrency_owner_arrested\/\" target=\"_blank\" rel=\"noopener\">charged with seven counts of fraud<\/a> (Source: The Register)<\/li>\n<li>Another day, another exposed list: Specifically, the paid-for <a href=\"https:\/\/securitydiscovery.com\/dow-jones-risk-screening-watchlist-exposed-publicly\/\" target=\"_blank\" rel=\"noopener\">Dow Jones watchlist<\/a> (Source: Security Discovery)<\/li>\n<li>Mobile malware continues to rise: Mobile threats may have been a little quiet recently, but that certainly doesn\u2019t mean they\u2019ve gone away. <a href=\"https:\/\/www.cbronline.com\/news\/smartphone-malware-mcafee\" target=\"_blank\" rel=\"noopener\">Ignore at your peril<\/a> (Source: CBR)<\/li>\n<li>PDF tracking: Viewing some samples in Chrome can lead to <a href=\"https:\/\/blog.edgespot.io\/2019\/02\/edgespot-detects-pdf-zero-day-samples.html\" target=\"_blank\" rel=\"noopener\">tracking behaviour<\/a> (source: Edgespot)<\/li>\n<li>Verification bait and switch: Instagram users who desire verification status should be <a href=\"https:\/\/uk.pcmag.com\/news\/119895\/phishing-scam-targets-instagram-users-by-offering-verified-b\" target=\"_blank\" rel=\"noopener\">wary of a phish<\/a> currently in circulation (Source: PCMag)<\/li>\n<li>Missile warning sent from hacked Twitter account: The dangers of not securing your social media profile take on a <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/25\/hijacker-pwns-tampa-mayors-account-2-weeks-before-election\/\" target=\"_blank\" rel=\"noopener\">whole new terrifying angle<\/a> (Source: Naked Security)<\/li>\n<li>Graphics card security update: NVIDIA rolls out a fix patching no less than <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4772\" target=\"_blank\" rel=\"noopener\">8 flaws<\/a> for their display driver (Source: NVIDIA)<\/li>\n<li>Momo, oh no: The supposed Momo challenge has predictably turned out to be an <a href=\"https:\/\/www.iflscience.com\/editors-blog\/the-truth-about-the-momo-suicide-challenge-is-actually-more-disturbing-than-you-think\/\" target=\"_blank\" rel=\"noopener\">urban myth<\/a>, except it was known to be a so-called creepypasta hoax for a long time (Source: IFLScience)<\/li>\n<li>Police arrest supplier of radios: Turns out you really don\u2019t want to <a href=\"https:\/\/www.cbc.ca\/news\/canada\/manitoba\/city-of-winnipeg-manager-in-charge-of-police-radios-arrested-after-2-year-investigation-1.5027975\" target=\"_blank\" rel=\"noopener\">install fraudulent software<\/a> from someone Homeland security considers to be a security threat (Source: CBC news)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/03\/week-security-february-25-march-3\/\">A week in security (February 25 \u2013 March 3)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/03\/week-security-february-25-march-3\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 04 Mar 2019 18:03:33 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/03\/week-security-february-25-march-3\/' title='A week in security (February 25 \u2013 March 3)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of the past week&#8217;s news, including mobile threats, viral scares, PDF tracking, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gpu\/\" rel=\"tag\">GPU<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/momo\/\" rel=\"tag\">momo<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pdf\/\" rel=\"tag\">PDF<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tracking\/\" rel=\"tag\">tracking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter\/\" rel=\"tag\">twitter<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/03\/week-security-february-25-march-3\/' title='A week in security (February 25 \u2013 March 3)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2019\/03\/week-security-february-25-march-3\/\">A week in security (February 25 \u2013 March 3)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10987,15444,19193,18428,10497,11241,454,10498],"class_list":["post-14745","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits","tag-gpu","tag-momo","tag-pdf","tag-security-world","tag-tracking","tag-twitter","tag-week-in-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14745"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14745\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}