Mozilla patches Firefox zero-day as attackers exploit flaw

Credit to Author: Gregg Keizer| Date: Thu, 09 Jan 2020 11:46:00 -0800

Just one day after releasing Firefox 72, Mozilla updated the browser with a fix to shut down active attacks, the company acknowledged.

On Wednesday, Mozilla issued Firefox 72.0.1, which included one change: A patch for the vulnerability identified as CVE-2019-17026. “We are aware of targeted attacks in the wild abusing this flaw,” Mozilla said in the short description of the flaw, signaling that criminals were already leveraging the zero-day vulnerability, the term applied because there no time elapses between patching and exploitation.

To read this article in full, please click here

Read more

Your Windows PC may become collateral damage in any conflict with Iran

Credit to Author: Preston Gralla| Date: Thu, 09 Jan 2020 10:18:00 -0800

When Iran launches cyberattacks in revenge for the killing of Major Gen. Qasem Soleimani — which it almost certainly will do — the attack vector, as always, will be Windows. And when that happens, your PC and your business’s PCs will be right in the crosshairs. Here’s why — and how you can protect your machines and your business.

A long history of U.S.-Iranian cyberwarfare

To understand the coming cyberattacks, it’s useful to look back. For more than a decade, the U.S. and Iran have engaged in low-level cyberwarfare, with occasional bursts of higher-level attacks. The most destructive of them was Stuxnet, launched in 2009 by the U.S. and Israel against Iran’s nuclear program. It exploited four zero-day flaws in Windows machines, which controlled the centrifuges Iran used to create nuclear material that can be used in nuclear weapons.

To read this article in full, please click here

Read more

Apple wants privacy laws to protect its users

Credit to Author: Jonny Evans| Date: Wed, 08 Jan 2020 06:54:00 -0800

Your iPhone (like most smartphones) knows when it is picked up, what you do with it, who you call, where you go, who you know – and a bunch more personal information, too.

The snag with your device knowing all this information is that once the data is understood, that information can be shared or even used against you.

Information is power

Jane Horvath, Apple’s senior director for global privacy, appeared at CES 2020 this week to discuss the company’s approach to smartphone security. She stressed the company’s opposition to the creation of software backdoors into devices, and also said:

To read this article in full, please click here

Read more

INTERPOL Collaboration Reduces Cryptojacking by 78%

Credit to Author: Trend Micro| Date: Wed, 08 Jan 2020 14:40:55 +0000

Cybercriminals are often seen as having the upper hand over the “white hat” community. After all, they’re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there’s one secret weapon the good guys have: Collaboration. That’s why Trend Micro has always prioritized its partnerships with law…

The post INTERPOL Collaboration Reduces Cryptojacking by 78% appeared first on .

Read more

Apple’s wants privacy laws to protect its users

Credit to Author: Jonny Evans| Date: Wed, 08 Jan 2020 06:54:00 -0800

Your iPhone (like most smartphones) knows when it is picked up, what you do with it, who you call, where you go, who you know – and a bunch more personal information, too.

Information is power

The snag with your device knowing all this information is that once the data is understood than that information can be shared or even used against you.

Jane Horvath, Apple’s senior director for global privacy, appeared at CES 2012 to discuss the company’s approach to smartphone security.

To read this article in full, please click here

Read more