Nearly a quarter of malware now communicates using TLS

Credit to Author: Luca Nagy| Date: Tue, 18 Feb 2020 13:30:07 +0000

Encryption is one of the strongest weapons malware authors can leverage: They can use it to obfuscate their code, to prevent users (in the case of ransomware) from being able to access their files, and for securing their malicious network communication. As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/XXvUtjG7XVU” height=”1″ width=”1″ alt=””/>

Read more

Council returns to using pen and paper after cyberattack

Credit to Author: John E Dunn| Date: Tue, 18 Feb 2020 11:44:46 +0000

Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Council’s IT systems will return.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/OeNzmMzg6c4″ height=”1″ width=”1″ alt=””/>

Read more

AI filter launched to block Twitter cyberflashing

Credit to Author: John E Dunn| Date: Tue, 18 Feb 2020 11:35:05 +0000

A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/CPnZboOMQOg” height=”1″ width=”1″ alt=””/>

Read more

IOTA shuts down network temporarily to fight wallet hacker

Credit to Author: Danny Bradbury| Date: Tue, 18 Feb 2020 11:12:57 +0000

Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/CvCaGAUzQzs” height=”1″ width=”1″ alt=””/>

Read more

Sensitive plastic surgery images exposed online

Credit to Author: Danny Bradbury| Date: Tue, 18 Feb 2020 11:04:56 +0000

Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/3bHx9OL42rQ” height=”1″ width=”1″ alt=””/>

Read more

Sophos Cloud Optix breakthrough IAM visualization is here

Credit to Author: Rich Beckett| Date: Mon, 17 Feb 2020 15:46:55 +0000

Easily visualize the relationships between IAM roles, IAM users, and services, and much more with the latest Sophos Cloud Optix release.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/W2wW5OLmqeQ” height=”1″ width=”1″ alt=””/>

Read more

Google pulls 500 malicious Chrome extensions after researcher tip-off

Credit to Author: John E Dunn| Date: Mon, 17 Feb 2020 12:07:48 +0000

Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/izP6lapUPOU” height=”1″ width=”1″ alt=””/>

Read more

Google forced to reveal anonymous reviewer’s details

Credit to Author: Danny Bradbury| Date: Mon, 17 Feb 2020 12:02:28 +0000

A court has forced Google to reveal the details of an anonymous poster who published an unpalatable review of a dentist.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/d4sEoG9Kawk” height=”1″ width=”1″ alt=””/>

Read more

Senator calls for dedicated US data protection agency

Credit to Author: Danny Bradbury| Date: Mon, 17 Feb 2020 11:55:15 +0000

The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/mOUsx7W00QI” height=”1″ width=”1″ alt=””/>

Read more