Security News > 2020 > June

Following weeks of heated protests in American cities - and criticism of law enforcement's use of force, surveillance, and drone aircraft in the skies above - the US government has belatedly asked the public what it thinks. The US Department of Homeland Security wants your comments on the use of drones by police and other first responders by July 9.

The Seed investment will help infiniDome strengthen its business vision of protecting connected and AI-equipped driverless vehicles. "We have been working closely with infiniDome for the last year and a half, using our experience and close relationships with local and global automotive partners to help them realize their product, market fit and growth potential," said Tal Cohen, Next Gear Founder and Managing Partner.

Stage 2 Security announces the hiring of Jacob Groth to serve as Chief Technology Officer, effective June 9, 2020. Jake will be based out of their corporate headquarters' office in McLean, VA. "We are extremely excited to welcome Jake to the S2 leadership team. Jake is known for his deep technical security knowledge, focused and strong performance within the security industry, and for being a driving force behind creating and executing industrialized next generation prevention and protection as-a-service solutions."

Cyberattackers are seizing upon the 24-hour news cycle again in order to capitalize on the current zeitgeist - this time with a fake Black Lives Matter malspam campaign that distributes the TrickBot malware. The messages use a grammatically challenged subject line, "Vote anonymous about Black Lives Matter," or "Leave a review confidentially about Black Lives Matter," and purport to contain a survey document.

In a paper recently published through the Journal of Cybersecurity, Cornell University assistant professor Karen Levy and security veteran Bruce Schneier argue that intimate relationships open the door to a set of privacy and security risks that haven't been anticipated or adequately addressed by the public, the technical community, and policymakers. "We describe privacy threats that arise in our intimate relationships: families, romances, friendships," said Levy.

The VBA macro leverages compromised victims' Microsoft Outlook email accounts to send spear-phishing emails to their contacts - rapidly widening the potential attack surface. Researchers say, while abusing a compromised mailbox to send malicious emails is not a new technique, this is the first publicly documented case of an attack group using both an Outlook macro and an OTM file to do so.

Scott Matteson: What are the challenges cybersecurity professionals are facing during the pandemic? Bindu Sundaresan: For cybersecurity teams across the globe, COVID-19 has presented a real-world stress test of how well their security controls as well as response strategies are working and also how effective they are in terms of providing the resilience needed by organizations today.

TechRepublic's two-factor authentication cheat sheet is an introduction to this essential element of cybersecurity. How does two-factor authentication work? There are a variety of two-factor authentication methods available, all of which have the same end goal: providing a way of proving a login is legitimate that's completely separate from the password.

Sneakily, the crooks have broadened the reach of their attack by keeping their emails short and objective - the crooks very deliberately haven't taken a social or political position, but have instead invited recipients to comment anonymously on the issue. As you can see, the yellow popup tries to discourage you from doing what the crooks say, warning you that macros are disabled for security reasons.

The increase in mobile banking application usage is expected to lead to a rise in exploitation too, the Federal Bureau of Investigation warns. Over the past several years, mobile banking applications have seen wide adoption, and their use went up by 50% since the beginning of this year, an alert from the FBI's Internet Crime Complaint Center reveals.