{"id":8613,"date":"2017-08-07T12:10:02","date_gmt":"2017-08-07T20:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2386\/"},"modified":"2017-08-07T12:10:02","modified_gmt":"2017-08-07T20:10:02","slug":"news-2386","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2386\/","title":{"rendered":"A week in security (July 31 \u2013 August 6)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 07 Aug 2017 19:19:51 +0000<\/strong><\/p>\n<p>Last week we explored some <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/learning-powershell-some-basic-commands\/\" target=\"_blank\" rel=\"noopener\">basic PowerShell commands<\/a>, dived into the new methods used by <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/08\/trickbot-comes-with-new-tricks-attacking-outlook-and-browsing-data\/\" target=\"_blank\" rel=\"noopener\">TrickBot<\/a>, and wrote at length about the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/enemy-at-the-gates-reviewing-the-magnitude-exploit-kit-redirection-chain\/\" target=\"_blank\" rel=\"noopener\">Magnitude exploit kit redirection chain<\/a>. Our teams were busy at both <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/black-hat-usa-2017-recap\/\" target=\"_blank\" rel=\"noopener\">BlackHat<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/conferences-security-world\/2017\/08\/defcon-25\/\" target=\"_blank\" rel=\"noopener\">DefCon<\/a>, and outside of those famous hallways, we also took time to fire up some basic\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/learning-powershell-basic-programs\/\" target=\"_blank\" rel=\"noopener\">PowerShell programs<\/a>.<\/p>\n<p>Naturally the two big security events have consumed most of the column inches this past week, but even so there&#8217;s still a couple of notable security stories floating around.<\/p>\n<h3>Latest updates for\u00a0Consumers<\/h3>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2017\/08\/03\/140k_paid_out_in_bitcoin_by_wannacrypt_victims\/\" target=\"_blank\" rel=\"noopener\">WannaCrypt victims paid out over $140k in Bitcoin to get files unscrambled<\/a>: Victims of Ransomware continue to pay the price (source: The Register)<\/p>\n<p><a href=\"http:\/\/chrispederick.com\/blog\/web-developer-for-chrome-compromised\/\" target=\"_blank\" rel=\"noopener\">Web Developer for Chrome compromised<\/a>: A timeline of how a Chrome extension was taken over by bad actors (source: Blog on Chris Pederick)<\/p>\n<p><a href=\"http:\/\/www.techrepublic.com\/article\/ios-users-beware-youre-the-biggest-target-for-mobile-phishing-attacks\/\" target=\"_blank\" rel=\"noopener\">iOS users beware<\/a>: You&#8217;re the biggest target for mobile phishing attacks: Keep a close eye on your trusty Apple devices (source: TechRepublic)<\/p>\n<p><a href=\"https:\/\/www.voanews.com\/a\/nigeria-us-phishing-scam\/3973069.html\" target=\"_blank\" rel=\"noopener\">Nigerian man charged in US phishing scam<\/a>: Contrary to popular belief, sometimes the phishers do get brought to justice (source: VOA News)<\/p>\n<p><a href=\"https:\/\/www.voanews.com\/a\/nigeria-us-phishing-scam\/3973069.html\" target=\"_blank\" rel=\"noopener\">Divorce, wiretapping, and email<\/a>: This domestic fallout has it all (source: The Register)<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>Malwarebytes Lab Team<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/week-security-july-31-august-6\/\">A week in security (July 31 \u2013 August 6)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/week-security-july-31-august-6\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 07 Aug 2017 19:19:51 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/week-security-july-31-august-6\/' title='A week in security (July 31 \u2013 August 6)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of security news and blog posts from the 31th of July to August 6th. We look at the events of BlackHat and DefCon, explore some new TrickBot tactics, delve into PowerShell commands and link some of the most notable security stories of the past week.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/round-up\/\" rel=\"tag\">round up<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weekly-round-up\/\" rel=\"tag\">weekly round up<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/week-security-july-31-august-6\/' title='A week in security (July 31 \u2013 August 6)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/week-security-july-31-august-6\/\">A week in security (July 31 \u2013 August 6)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13405,13053,10497,10498,11383],"class_list":["post-8613","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-round-up","tag-roundup","tag-security-world","tag-week-in-security","tag-weekly-round-up"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8613"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8613\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}