Security News > 2018 > February

Ad Network Performs In-Browser Cryptojacking
2018-02-27 19:43

An ad network provider is performing in-browser Coinhive cryptojacking on websites that use its service, 360 Netlab security researchers warn. read more

How Google implements the Right To Be Forgotten
2018-02-27 19:24

Who is asking Google to delist certain URLs appearing in search results related to their name, and what kind of requests does the search giant honor? The company has been keeping track of them...

Memcached Abused for DDoS Amplification Attacks
2018-02-27 18:58

Malicious actors have started abusing the memcached protocol to launch distributed denial-of-service (DDoS) attacks, Cloudflare and Arbor Networks warned on Tuesday. read more

IoT Devices: Reducing the Risks
2018-02-27 18:33

Attorney Steven Teppler, who recently wrote a report that addresses risks related to the internet of things, offers insights on risk management steps organizations in all sectors must take as IoT...

Thanatos Ransomware Makes Data Recovery Impossible
2018-02-27 18:22

A newly discovered ransomware family is generating a different encryption key for each of the encrypted files but saves none of them, thus making data recovery impossible.   read more

Mobile banking Trojans spread confusion worldwide
2018-02-27 17:46

Consumers around the world that use mobile banking apps are at a greater risk of being tricked by cybercriminals and falling victim to mobile banking theft. This is according to new global...

Remote Code Execution Bug Patched in Adobe Acrobat Reader DC
2018-02-27 17:46

A remote code execution security flaw has been patched in one of the latest versions of Adobe Acrobat Reader DC.

Samsung Smartphones Get Encrypted Communications
2018-02-27 17:26

KoolSpan this week announced a partnership with Samsung to implement secure communications on Samsung smartphones. read more

Perimeter vs Persistent Security: Five Steps to Ensure Network Security
2018-02-27 16:06

Enterprises Must Formulate a Plan of Action Through Testing and Remediate Issues Before They Get Out of Control read more

Widespread Vulnerability Found in Single-Sign-On Products
2018-02-27 14:41

A behavioral quirk in SAML libraries has left many single-sign-on (SSO) implementations vulnerable to abuse. It allows an attacker that has gained any authenticated access to trick the system into...