{"id":9217,"date":"2017-09-11T13:10:22","date_gmt":"2017-09-11T21:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/11\/news-2990\/"},"modified":"2017-09-11T13:10:22","modified_gmt":"2017-09-11T21:10:22","slug":"news-2990","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/09\/11\/news-2990\/","title":{"rendered":"A week in security (September 4 &#8211; September 10)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Sep 2017 19:53:29 +0000<\/strong><\/p>\n<p>Last week, we looked into expired domain names being <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/\" target=\"_blank\" rel=\"noopener\">used for malvertising<\/a>, delved into <a href=\"https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/09\/facebook-worries-i-didnt-post-that\/\" target=\"_blank\" rel=\"noopener\">dubious Facebook apps<\/a>, and checked out <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/nigerian-scams-without-the-nigerians\/\" target=\"_blank\" rel=\"noopener\">Chinese seminar scams<\/a>. We also explained the whys and wherefores of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/explained-false-positives\/\" target=\"_blank\" rel=\"noopener\">false positives<\/a>, explained what <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/09\/google-reminds-website-owners-to-move-to-https-before-october-deadline\/\" target=\"_blank\" rel=\"noopener\">Google is doing with HTTPs<\/a>, warned you away from a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/fake-dhs-email-give-us-350-in-the-next-24-hours\/\" target=\"_blank\" rel=\"noopener\">fake DHS email<\/a>, and outlined some early information about the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Equifax breach<\/a>.<\/p>\n<p>Elsewhere:<\/p>\n<h3>Consumer News<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.theregister.co.uk\/2017\/09\/08\/equifax_breach_notification\/\" target=\"_blank\" rel=\"noopener\">Equifax mega-leak<\/a>: The biggest story around, with updates on the initial breach coming thick and fast <em>(Source: The Register)<\/em><\/li>\n<li><a href=\"https:\/\/blog.newskysecurity.com\/iot-hackers-shift-to-the-dark-side-cd3d0005a5e0\" target=\"_blank\" rel=\"noopener\">IoT hackers shift to the dark side<\/a>: A tangled tale of hacking, and personal information scattering <em>(Source: NewSky Security)<\/em><\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2017\/09\/08\/android-toast-overlay\/\" target=\"_blank\" rel=\"noopener\">Patch your Android device to foil Toast Overlay attacks<\/a>:\u00a0Overlay attacks are nothing new for Android users, and Palo Alto Networks Unit 42 researchers have found yet another way for attackers to perpetrate them. <em>(Source: Help Net Security)<\/em><\/li>\n<li><a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/hackers-send-secret-commands-speech-recognition-systems-ultrasound\/\" target=\"_blank\" rel=\"noopener\">How hackers could send secret commands to speech recognition systems with ultrasound<\/a>: Chinese security researchers have discovered a way to send secret, inaudible commands to speech recognition systems such as Siri, Amazon Alexa, and Google Home using ultrasound. <em>(Source: Tripwire&#8217;s The State of Security Blog)<\/em><\/li>\n<li><a href=\"https:\/\/www.hackread.com\/fake-chrome-firefox-font-update-drops-rat-and-locky-ransomware\/\" target=\"_blank\" rel=\"noopener\">Fake browser font update drops RAT \/ locky Ransomware<\/a>: Fake browser font scams have been around for a while now, but they remain just as deadly (source: HackRead)<\/li>\n<\/ul>\n<h3>Business News<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2017\/09\/08\/insider-threat-ransomware-ddos-fear\/\" target=\"_blank\" rel=\"noopener\">Insider threats, Ransomware, and DDoS most feared<\/a>: The latest workplace worries courtesy of a SANS survey (source: Help Net Security)<\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/2017\/09\/06\/workplace-surveillance-privacy\/\" target=\"_blank\" rel=\"noopener\">European courts and workplace surveillance, oh my<\/a>: An interesting case of balancing workplace checks with employee privacy (source: Help Net Security)<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/09\/07\/unsecured-databases-are-still-the-low-hanging-fruit-of-the-internet\/\" target=\"_blank\" rel=\"noopener\">Unsecured databases &#8211; the low hanging fruit of the Internet<\/a>: This might be the perfect time to make sure your databases aren&#8217;t wide open to hack attacks (source: Naked Security)<\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>Malwarebytes Lab Team<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/09\/week-security-september-4-september-10\/\">A week in security (September 4 &#8211; September 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/09\/week-security-september-4-september-10\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 11 Sep 2017 19:53:29 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/09\/week-security-september-4-september-10\/' title='A week in security (September 4 - September 10)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of security news and blog posts from the 4th &#8211; 10th September. We touched on threat surveys, Android patching, the Equifax breach and more!<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ddos\/\" rel=\"tag\">ddos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hackers\/\" rel=\"tag\">hackers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/roundup\/\" rel=\"tag\">roundup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/week-in-security\/\" rel=\"tag\">week in security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/09\/week-security-september-4-september-10\/' title='A week in security (September 4 - September 10)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/09\/week-security-september-4-september-10\/\">A week in security (September 4 &#8211; September 10)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10514,6272,10531,3764,13053,10497,10518,10498],"class_list":["post-9217","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ddos","tag-hackers","tag-malvertising","tag-malware","tag-roundup","tag-security-world","tag-spam","tag-week-in-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9217"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}