Sophos identifica 15 aplicaciones en la Play Store de Google que utilizan adware para ocultarse

Credit to Author: Naked Security| Date: Thu, 17 Oct 2019 07:55:21 +0000

Desde hace años, los desarrolladores de aplicaciones móviles incluyen dentro de su programación un código publicitario, como una forma de ayudar a sufragar los costes del desarrollo de dicha app. Sin embargo, algunos desarrolladores simplemente utilizan las aplicaciones como una plataforma abusiva desde la que introducir anuncios en los dispositivos móviles de los usuarios. Recientemente, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/B2Oy8PVRVNs” height=”1″ width=”1″ alt=””/>

Read more

Soldar chips espías dentro de firewalls ahora es un truco barato

Credit to Author: Naked Security| Date: Wed, 16 Oct 2019 16:54:02 +0000

El pequeño chip ATtiny85 no parece ser la próxima gran ciberamenaza a la que se enfrente el mundo, pero colocar uno en una placa base de un firewall sería una mala noticia para la seguridad. De hecho, esto ya sucedió como parte de un proyecto del investigador Monta Elkins, diseñado para demostrar que este tipo [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TCnFffNVVjA” height=”1″ width=”1″ alt=””/>

Read more

Some Android adware apps hide icons to make it hard to remove them

Credit to Author: John E Dunn| Date: Fri, 18 Oct 2019 11:31:24 +0000

SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/AoUMvk8i70E” height=”1″ width=”1″ alt=””/>

Read more

Bitcoin money trail leads cops to ‘world’s largest’ child abuse site

Credit to Author: Lisa Vaas| Date: Fri, 18 Oct 2019 11:25:35 +0000

The Darknet server running the site, “Welcome to Video”, and the website’s convicted admin were tracked down by a global police force.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/U8nlPah7fZQ” height=”1″ width=”1″ alt=””/>

Read more

Much-attacked Baltimore uses ‘mind-bogglingly’ bad data storage

Credit to Author: Lisa Vaas| Date: Fri, 18 Oct 2019 09:44:01 +0000

IT workers have been storing files on their computers’ hard drives. One councilman’s alleged response: “That can’t be right? That’s real?”<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/idJHYqiJ_xU” height=”1″ width=”1″ alt=””/>

Read more

Beware the square: how to spot malicious QR codes

Credit to Author: Doug Aamoth| Date: Thu, 17 Oct 2019 17:04:45 +0000

QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website?<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/_b20DFJDcw0″ height=”1″ width=”1″ alt=””/>

Read more

Pen testers find mystery black box connected to ship’s engines

Credit to Author: John E Dunn| Date: Thu, 17 Oct 2019 10:21:35 +0000

It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was meant to be there.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/JHJliLzwFeQ” height=”1″ width=”1″ alt=””/>

Read more