Security News > 2020 > January

In order to shift security postures from reactive to proactive positioning, organizations will need to re-evaluate their security strategy so that they are able to shape the attack surface to their advantage and make network traffic analysis solutions the cornerstone of their detection and response capabilities relied on by SOC teams. First, organizations need to know what their security stack contains - what capabilities are present and utilized, what capabilities are missing, and what capabilities may be duplicative.

Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone-even if downloaded from the official Google Store store-you have been hacked and being tracked. These newly detected malicious Android apps are Camero, FileCrypt, and callCam that are believed to be linked to Sidewinder APT, a sophisticated hacking group specialized in cyber espionage attacks.

A new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. The new research, Mobile Payment Authentication: Biometrics, Regulation & Forecasts 2019-2024, however notes that the majority of smartphone facial recognition will be software-based, with over 1.3 billion devices having that capability by 2024.

January 14, 2020, is a day cybersecurity stakeholders should pay attention to, as it marks the end of Microsoft support in Windows 7. Cynet 360 autonomous breach protection is a good example of a multilayered advanced protection solution that can enable organizations who run Windows 7 to remain secure despite the end of support.

At least three malicious apps with device-hijacking exploits have made it onto the Google Play Store in recent weeks. The malicious apps were Camero, FileCrypt, and callCam, so check if you still have them installed.

In recent years, burner phones have become an obligatory part of the international business traveler's toolkit. Though these devices are designed to minimize the amount of stored data available for capture by malicious actors in a foreign country, burner phones actually give attackers an opening to another, potentially more valuable, form of data: conversations that occur during key meetings in the vicinity of the device.

In terms of the state of data, it can be reduced to who owns data, aka, data ownership equates to data control. In turn, further layers of the data onion will peel away to reveal more questions, such as, who owns the responsibility in complying with data regulations? And where does the responsibility for data security actually lie? If a customer uploads an image to your site - who owns that image? And, who is responsible for keeping it safe?

A malicious application in the Google Play store targeted a recently patched zero-day vulnerability that affects multiple Android devices, including Google's Pixel phones. Tracked as CVE-2019-2215, the vulnerability was disclosed as a zero-day in October by Google Project Zero security researcher Maddie Stone.

"We considered growth rounds and strategic offers, but by partnering with Insight we have the best of both worlds - operational support and independence, both of which were important in our decision to take on a scaleup partner this early in our company journey," said Yevgeny Dibrov, co-founder and CEO at Armis. "We are thankful for the support we received from our investors at Sequoia, Tenaya, Bain, and Red Dot; and we, as well as the whole Armis team, are very excited to have Insight working alongside us as we enter this next phase, accelerating our platform and growth."

TP-Link, a leading global provider of consumer and business networking products, expanded its Wi-Fi 6 product line with two new AX6600 tri-band routers, a new AX3000 PCI-Express Network Card and a new AX1500 range extender. "Our innovative lineup of Wi-Fi 6 systems represents the next leap forward for networking products," said Louis Liu, CEO of TP-Link USA. "These groundbreaking systems deliver the most robust and reliable Wi-Fi experience available on the market at competitive price points. They are the perfect choice for consumers that demand the highest performance and want to take their Wi-Fi experience to the next level."