Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NHS cyber-defender Marcus Hutchins charged in US

No good deed goes unpunished – WannaCry defender accused of earlier involvement in 2014 with the Kronos banking malware.


Watch out for the Android malware that snoops on your phone

From Sophos Naked Security – GhostCtrl, being distributed by rogue versions designed to look like legitimate apps, can ...

Continue Reading →
0

Smartphones Need Security Too

When a smartphone is stolen, it is a disaster.  You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app.  If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks.  If you have live camera ...

Continue Reading →
0

Android Game Hides Crypto-Ransomware Exploit

There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.”  Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.

This game is available on international gaming forums, and is being spread when gamers download a copy ...

Continue Reading →
0

Should Facebook Manage Password Recovery?

Back on February 22nd, we discussed Facebook’s new Delegated Account Recovery feature.  Basically, if you should for some reason forget your password to any account, or lose your two-factor authentication device (smartphone), and can no longer get into your account, Facebook will help you recover the account, as long as it is one that is enrolled with Facebook.

This is not the same thing as password managers like DashLane or LastPass, ...

Continue Reading →
0

The Top Cybersecurity Strategies That Prevent Targeted Attacks

According to the Department of Homeland Security (DHS), there are seven strategies that will prevent 85% of targeted attacks.  To this list I have added a few of my favorites.

  • Password Manager Programs – If you are truly going to have dozens or hundreds of unique and long passwords, you will need the help of a password manager program to keep them all straight, and ...
Continue Reading →
0

Protecting Your Professional Reputation

Controlling your professional information can mean managing the information you disclose on professional networking sites such as LinkedIn.  It can also mean protecting the client and employee information you have gathered through your employment.   It may mean securing your computer network from outside and inside attackers, or your website from compromise.  It may mean properly securing online assets ...

Continue Reading →
0

Malware Turns Smartphone Into Eavesdropper

I read an interesting article on Naked Security the other day about how Hamas had used Facebook and social engineering tactics to trick Israeli soldiers into installing surveillance malware.  The malware allowed Hamas to track the soldiers using the phone’s GPS, and to turn on the microphone and video to actually listen in and and watch their targets.  Hamas undoubtedly picked up the ...

Continue Reading →
3

Facebook Adds USB Key Two-Factor Authentication

Facebook has added USB key security to it’s two-factor authentication options.  Previously, Facebook users could add the additional security of two-factor authentication to their account by using the Facebook app to receive a six digit one-time passcode, or by having the code sent to their smart phone via SMS text message.  Facebook now supports the open-source Universal 2 Factor (U2F) standard established by the FIDO Alliance, such as the  Yubikey from ...

Continue Reading →
0

Watch Out For Fake Mobile Apps

The Federal Trade Commission recently released an warning about fraudulent mobile apps.  These apps are designed to steal personal information such as user names, passwords, credit card numbers, and other personal information.

My advise is to always get your app from an authorized app store, such as the Apple Store or the Google Store.  These apps have been tested for the most part.

Another idea ...

Continue Reading →
0
Page 8 of 10 «...678910