{"id":9764,"date":"2017-10-09T13:10:04","date_gmt":"2017-10-09T21:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/09\/news-3537\/"},"modified":"2017-10-09T13:10:04","modified_gmt":"2017-10-09T21:10:04","slug":"news-3537","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/10\/09\/news-3537\/","title":{"rendered":"A week in security (October 02 \u2013 October 08)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Oct 2017 20:26:06 +0000<\/strong><\/p>\n<p>Last week, we gave you some tips for <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/national-cybersecurity-awareness-month-simple-steps-for-online-safety\/\" target=\"_blank\" rel=\"noopener\">National Cybersecurity Awareness Month<\/a>, walked through an <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/using-ilspy-to-analyze-a-small-adware-file\/\" target=\"_blank\" rel=\"noopener\">exploration of a small adware file<\/a>, and explored the complicated world of the <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\" target=\"_blank\" rel=\"noopener\">Homograph attack<\/a>. Here&#8217;s what else happened in security.<\/p>\n<h3><strong>VB2017<\/strong><\/h3>\n<p>Many of our team members attended <a href=\"https:\/\/www.virusbulletin.com\/conference\/vb2017\/\" target=\"_blank\" rel=\"noopener\">VB2017<\/a> in Madrid, one of the premier yearly security conferences that brings together researchers, companies, law enforcement, and more in an effort to explore the latest security research. Here&#8217;s a collection of articles from The Register&#8217;s John Leyden, who was in attendance:<\/p>\n<ul>\n<li>Bulletproof hosts stay online by operating out of disputed backwaters: A look at how dubious hosts are retreating to places where they can <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/05\/bulletproof_hosting\/\" target=\"_blank\" rel=\"noopener\">continue to offer dubious services<\/a>.<\/li>\n<li>Spy vs. spy vs. hacker vs&#8230; who is THAT? Everyone&#8217;s hacking each other: The problem of Intel gathering when everyone is <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/05\/fog_of_cyberwar\/\" target=\"_blank\" rel=\"noopener\">muddying the waters<\/a>.<\/li>\n<li>Hey, IoT vendors. When a paediatric nurse tells you to fix security, you definitely screwed up: The alarming world of <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/05\/nurse_iot\/\" target=\"_blank\" rel=\"noopener\">IoT medical devices<\/a>.<\/li>\n<li>Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster: An interesting look at the timeline behind the <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/06\/ccleaner_megahack_timeline\/\" target=\"_blank\" rel=\"noopener\">recent CCleaner issues<\/a>.<\/li>\n<li>Video games used to be an escape. Now not even they are safe from ads: My own talk, where I <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/09\/mobile_gaming_ads\/\" target=\"_blank\" rel=\"noopener\">explore the long(ish) history of Advergaming<\/a>, tricks used to force you to look at ads in games, and how it threatens to reshape many of your real-world interactions via augmented reality. Once the VB talks are uploaded to YouTube, I&#8217;ll be linking to many of them.<\/li>\n<\/ul>\n<h3><strong>Other news<\/strong><\/h3>\n<ul>\n<li>3 billion Yahoo! accounts affected by 2013 breach: <a href=\"https:\/\/www.oath.com\/press\/yahoo-provides-notice-to-additional-users-affected-by-previously\/\" target=\"_blank\" rel=\"noopener\">whoops<\/a>.<\/li>\n<li>The privacy implications of email tracking: Interesting research on the <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/10\/05\/email-tracking\/\" target=\"_blank\" rel=\"noopener\">problems posed by such techniques<\/a> (source: Help Net Security)<\/li>\n<li>The font fake out: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/as-if-miners-werent-enough-roboto-condensed-attack-now-pushing-crapware\/\" target=\"_blank\" rel=\"noopener\">malicious fake fonts<\/a> are still causing headaches (source: Bleeping Computer)<\/li>\n<li>One phish = one fish: Santander are touring the UK and trading <a href=\"http:\/\/www.campaignlive.co.uk\/article\/santander-hands-fish-chips-raise-awareness-phishing-scams\/1446639\" target=\"_blank\" rel=\"noopener\">one meal of fish and chips<\/a> for a copy of a phishing mail\/text. Yum! (source: CampaignLive)<\/li>\n<li>Phishing via email intercept: A clever way to <a href=\"http:\/\/www.zdnet.com\/article\/this-sneaky-phishing-attack-hijacks-your-chats-to-spread-malware\/\" target=\"_blank\" rel=\"noopener\">wander into a conversation<\/a> without permission (source: ZDNet)<\/li>\n<\/ul>\n<p>Stay safe everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/10\/a-week-in-security-october-02-october-08\/\">A week in security (October 02 \u2013 October 08)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/10\/a-week-in-security-october-02-october-08\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 Oct 2017 20:26:06 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/10\/a-week-in-security-october-02-october-08\/' title='A week in security (October 02 \u2013 October 08)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-702886-calendar-l.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A compilation of security news and blog posts from the 2nd of October to the 8th of October. We touched on the VB2017, National Cybersecurity Awareness Month, and more.  <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/week-in-security\/\" rel=\"category tag\">Week in security<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vb2017\/\" rel=\"tag\">VB2017<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/10\/a-week-in-security-october-02-october-08\/' title='A week in security (October 02 \u2013 October 08)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/week-in-security\/2017\/10\/a-week-in-security-october-02-october-08\/\">A week in security (October 02 \u2013 October 08)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,10495,3764,3924,10497,15604,10498],"class_list":["post-9764","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-iot","tag-malware","tag-phishing","tag-security-world","tag-vb2017","tag-week-in-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9764"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9764\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}