{"id":14811,"date":"2019-03-11T08:10:07","date_gmt":"2019-03-11T16:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/11\/news-8560\/"},"modified":"2019-03-11T08:10:07","modified_gmt":"2019-03-11T16:10:07","slug":"news-8560","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/11\/news-8560\/","title":{"rendered":"A week in security (March 4 \u2013 11)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Mar 2019 15:47:27 +0000<\/strong><\/p>\n<p>Last week, Malwarebytes Labs released its <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/labs-survey-finds-privacy-concerns-distrust-of-social-media-rampant-with-all-age-groups\/\" target=\"_blank\" rel=\"noopener\">in-depth, international data privacy survey of nearly 4,000 individuals<\/a>, revealing that every generation, including Millennials, cares about online privacy. We also covered a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/zombie-email-rises-from-grave-after-8-years-of-radio-silence\/\" target=\"_blank\" rel=\"noopener\">novel case of zombie email<\/a> that involved a very much alive account user, delved into the <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\" rel=\"noopener\">typical data privacy laws a US startup might have to comply with<\/a> on its journey to success, and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/spotlight-troldesh-ransomware-aka-shade\/\" target=\"_blank\" rel=\"noopener\">spotlighted the Troldesh ransomware<\/a>, also known as &#8220;Shade.&#8221;<\/p>\n<h3><strong>Other security news<\/strong><\/h3>\n<ul>\n<li>The National Security Agency <a href=\"https:\/\/www.nytimes.com\/2019\/03\/04\/us\/politics\/nsa-phone-records-program-shut-down.html\" target=\"_blank\" rel=\"noopener\">allegedly shut down an invasive telephone record surveillance program<\/a> just months before its legal authority would expire. No word yet on whether this will actually prevent the warrantless spying that invades Americans\u2019 private lives. (Source: The New York Times)<\/li>\n<li>The RSA Conference swept into San Francisco last week, bringing the infosec community together to talk <a href=\"https:\/\/threatpost.com\/machine-learning-dark-side\/142616\/\" target=\"_blank\" rel=\"noopener\">machine learning<\/a>, <a href=\"https:\/\/threatpost.com\/rsac-2019-for-domestic-abuse-iot-devices-pose-new-threat\/142332\/\" target=\"_blank\" rel=\"noopener\">domestic abuse<\/a>, and the <a href=\"https:\/\/threatpost.com\/ultrasound-hacked\/142601\/\" target=\"_blank\" rel=\"noopener\">ultra-weak security behind ultrasound scanning<\/a>. (Source: ThreatPost)<\/li>\n<li>Speaking of conferences, New York Times front end developer Natalya Shelburne <a href=\"https:\/\/open.nytimes.com\/what-if-child-care-were-as-standard-as-coffee-at-tech-conferences-568c5fba028e\" target=\"_blank\" rel=\"noopener\">asked why more conferences don\u2019t provide childcare services for their speakers<\/a>. (Source: The New York Times \u201cOpen,\u201d a project on Medium)<\/li>\n<li>Motherboard <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/gyakgw\/the-prototype-dev-fused-iphones-that-hackers-use-to-research-apple-zero-days\" target=\"_blank\" rel=\"noopener\">investigated the intricate world behind \u201cdev-fused\u201d iPhones<\/a>\u2014pre-jailbroken devices that are rare in supply and coveted by iOS hackers around the world. (Source: Motherboard)<\/li>\n<li>Google <a href=\"https:\/\/thehackernews.com\/2019\/03\/update-google-chrome-hack.html\" target=\"_blank\" rel=\"noopener\">discovered, disclosed, and fixed a zero-day vulnerability in its Chrome browser<\/a> that could have allowed threat actors to control victims\u2019 machines. (Source: The Hacker News)<\/li>\n<li>Security researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/insecure-database-leads-to-over-800-million-records-data-breach\/\" target=\"_blank\" rel=\"noopener\">discovered an unprotected MongoDB database that included more than 800 million email records<\/a>. (Source: Bleeping Computer)<\/li>\n<li>A Verizon study revealed that <a href=\"https:\/\/www.csoonline.com\/article\/3353560\/one-in-three-organizations-suffered-data-breaches-due-to-mobile-devices.html\" target=\"_blank\" rel=\"noopener\">one in three businesses suffered a compromise because of a mobile device<\/a> in the past year. (Source: CSO Online)<\/li>\n<li>The US President referred to Apple CEO Tim Cook as \u201cTim Apple,\u201d and Cook later responded by <a href=\"https:\/\/thehill.com\/blogs\/blog-briefing-room\/news\/433069-tim-cook-changes-twitter-name-after-trump-calls-him-tim-apple\" target=\"_blank\" rel=\"noopener\">changing his Twitter display name<\/a>, inserting an apple emoji after \u201cTim.\u201d (Source: The Hill)<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/a-week-in-security-march-4-11\/\">A week in security (March 4 \u2013 11)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/a-week-in-security-march-4-11\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Mar 2019 15:47:27 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/a-week-in-security-march-4-11\/' title='A week in security (March 4 \u2013 11)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A roundup of cybersecurity news from March 4\u201311, including a Chrome zero-day, Labs&#8217; data privacy report, news from RSA, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/baby-boomer\/\" rel=\"tag\">Baby Boomer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/baby-boomers\/\" rel=\"tag\">Baby Boomers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chrome\/\" rel=\"tag\">chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-laws\/\" rel=\"tag\">data privacy laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dev-fuse\/\" rel=\"tag\">dev-fuse<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gen-zed\/\" rel=\"tag\">Gen Zed<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-chrome\/\" rel=\"tag\">Google Chrome<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iphone\/\" rel=\"tag\">iPhone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/machine-learning\/\" rel=\"tag\">machine learning<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/millennial\/\" rel=\"tag\">Millennial<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/millennials\/\" rel=\"tag\">Millennials<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/national-security-agency\/\" rel=\"tag\">National Security Agency<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa\/\" rel=\"tag\">NSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom-troldesh\/\" rel=\"tag\">ransom.troldesh<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rsa\/\" rel=\"tag\">RSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rsa-conference\/\" rel=\"tag\">RSA Conference<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shade\/\" rel=\"tag\">shade<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/study\/\" rel=\"tag\">study<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/surveillance\/\" rel=\"tag\">surveillance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/survey\/\" rel=\"tag\">survey<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tim-apple\/\" rel=\"tag\">Tim Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tim-cook\/\" rel=\"tag\">Tim Cook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/troldesh\/\" rel=\"tag\">Troldesh<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/troldesh-ransomware\/\" rel=\"tag\">Troldesh ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ultrasound\/\" rel=\"tag\">ultrasound<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ultrasound-scanning\/\" rel=\"tag\">ultrasound scanning<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/us-data-privacy-laws\/\" rel=\"tag\">US data privacy laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/verizon\/\" rel=\"tag\">Verizon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vulnerability\/\" rel=\"tag\">vulnerability<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day\/\" rel=\"tag\">zero day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zombie-email\/\" rel=\"tag\">zombie email<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/a-week-in-security-march-4-11\/' title='A week in security (March 4 \u2013 11)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/a-week-in-security-march-4-11\/\">A week in security (March 4 \u2013 11)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,21206,21207,10699,21178,21208,21209,11427,8826,12038,17449,1564,11566,10626,21158,3765,11315,11391,10497,21160,9191,4053,887,21210,14808,11341,21211,20842,21212,21213,2212,10467,10498,11524,21191],"class_list":["post-14811","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-baby-boomer","tag-baby-boomers","tag-chrome","tag-data-privacy-laws","tag-dev-fuse","tag-gen-zed","tag-google-chrome","tag-iphone","tag-machine-learning","tag-millennial","tag-millennials","tag-national-security-agency","tag-nsa","tag-ransom-troldesh","tag-ransomware","tag-rsa","tag-rsa-conference","tag-security-world","tag-shade","tag-study","tag-surveillance","tag-survey","tag-tim-apple","tag-tim-cook","tag-troldesh","tag-troldesh-ransomware","tag-ultrasound","tag-ultrasound-scanning","tag-us-data-privacy-laws","tag-verizon","tag-vulnerability","tag-week-in-security","tag-zero-day","tag-zombie-email"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14811"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14811\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}