Security News > 2020 > September

Joker Spyware Plagues More Google Play Apps
2020-09-02 16:24

Google has deleted six apps from its Google Play marketplace that were infecting users with the Joker malware. As of Wednesday, Google confirmed with Threatpost that all infected applications have been removed from Google Play, but researchers said that they are still installed on the devices of their users, and urged users to immediately delete the apps.

Replace your passwords with passphrases: Here's how to use them to remain secure
2020-09-02 16:04

Instead of trying to remember a long and complex password, try switching to passphrases. You should be cautious about using passphrases based on commonly known things about you.

How to enable end-to-end encryption for the Nextcloud app
2020-09-02 14:50

Learn how you can enable the new Nextcloud end-to-end encryption. What you'll need How to enable encryption on Nextcloud.

How insider threats pose risks and challenges to any organization
2020-09-02 14:10

As organizations try to defend themselves against external threats, they need to remember that insider threats can also cause harm. A report released Wednesday by security provider Bitglass shines a light on the ramifications of insider threats and offers advice on how to use the right security features to combat them.

Phishing scam uses Sharepoint and One Note to go after passwords
2020-09-02 14:03

The Sharepoint link you're expected to click to access the One Note file does look suspicious because there's no clear connection between the sender's company and the location of the One Note lure. It's only at this stage that the crooks present their call-to-action link - the click that they didn't want to put directly ino the original email, where it would have stood out more obviously as a phishing scam.

33% of companies expose unsafe network services to the internet
2020-09-02 13:05

A new report finds that 33% of companies within the digital supply chain expose common network services such as data storage, remote access, and network administration to the internet. Admins should either eliminate direct internet access or deploy compensating controls for when/if such services are required, according to the report by RiskRecon, a Mastercard company, and the cybersecurity research services firm Cyentia Institute.

Live Webinar: XDR and Beyond
2020-09-02 13:00

Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response. Why is XDR receiving all the buzz? Combining security technologies in a usable manner has become the bane of cybersecurity as technology spread has overwhelmed the space.

Minister: New Zealand Enduring Wave of Cyberattacks
2020-09-02 12:33

Rew Little said in an interview with The Associated Press on Wednesday that tracking down the perpetrators of the attacks in recent weeks would be extremely difficult, as the distributed denial of service attacks are being routed through thousands of computers. One line of investigation is the emails sent to people in some of the targeted organizations demanding a ransom in exchange for stopping the attacks, Little said.

Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers
2020-09-02 12:28

Cisco Systems says hackers are actively exploiting previously unpatched vulnerabilities in its carrier-grade routers that could allow adversaries to crash or severely disrupt devices. The vulnerabilities exist in the Distance Vector Multicast Routing Protocol feature of Cisco IOS XR Software and could allow an unauthenticated, remote attacker to immediately crash the Internet Group Management Protocol process, the company warned in an advisory over the weekend.

Things are getting back to normal: Chinese hackers revert to bugging Tibetans after brief Euro campaign
2020-09-02 11:30

Malware pathologists have noted a return to "Business as usual" as groups associated with Chinese state interests turned their attentions back to Tibetan matters after a European dalliance earlier this year. Back in March, a phishing campaign attempted to deliver the "Sepulcher" malware to various European institutions with a sender email identified as being linked to historical Chinese APT targeting of the Tibetan community, Proofpoint said.