Malicious Android Apps Steal Text Messages

Sophos Naked Security alerted us to two Android apps that are included in the Google Play Store as legitimate apps.  This makes these apps particularly dangerous, if you are following our advice to only install apps from legitimate sources.  Once installed, they download a plug-in that harvests your text messages and sends them to a web server.  Since the plug-in is downloaded after ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NHS cyber-defender Marcus Hutchins charged in US

No good deed goes unpunished – WannaCry defender accused of earlier involvement in 2014 with the Kronos banking malware.


Watch out for the Android malware that snoops on your phone

From Sophos Naked Security – GhostCtrl, being distributed by rogue versions designed to look like legitimate apps, ...

Continue Reading →
0

Not All Attacks Are Cyber Attacks – Watch For Phone Scams Too

As long as we are on the subject of telephone fraud, here is a post inspired by a recent article from Naked Security.  It reminded me that not all attacks are high-tech cyber-attacks.  The phone is still an effective tool used by criminals to extract cash from their victims, and the losses can be in the thousands.

Here are some different scams run by these scammers:

  • Tech support scam: ...
Continue Reading →
0

Is Phone Phreaking Still A Thing? Recent FBI Arrest Says Yes

Phone phreaking refers to the exploration of phone systems and networks to discover how they work.  It also refers to the exploitation of telephone lines and systems in order to make free long distance calls.   Like the term “hacking,” it can refer to both the curious and the criminal.

Time to climb into Mr Peabody’s WABAC Machine for our history lesson.  Phone phreaking got its start in ...

Continue Reading →
0

Email Account Hijacking – Part 4 Prevention and Dectection

Last week we went deep on the subject of just how bad losing control of your email account can be.  Today we are wrapping up the four-part series with solutions to help you prevent email account compromise from happening, how to detect if it has already happened to you, and how to recover if that is the case.

Prevention is the best solution.  Your email account is one of the crown ...

Continue Reading →
0

Sunday Funnies: Eating

I started working the Ketogenic or “Paleo” diet plan about 6 months ago.  The goal:  lose 30 pounds and turn my keg back into a six pack.  I am not going to write a huge article here, this is supposed to be funny.  But if you are someone who goes in the out door, goes grocery shopping after midnight to avoid the crowds, and buys stocks when everybody else is selling – you are a contrarian, and this diet plan ...

Continue Reading →
0

Weekend Update

FBI Releases Article on Privacy Risks Associated with Internet-Connected Children’s Toys

07/17/2017 01:37 PM EDT  Original release date: July 17, 2017

The Federal Bureau of Investigation (FBI) has released an article on the privacy risks associated with Internet-connected children’s toys. FBI warns that Internet-connected toys may contain “sensors, microphones, cameras, data storage components, and other multimedia capabilities – including speech recognition and GPS options” that may put the privacy and safety of children at risk due to the disclosure ...

Continue Reading →
0

Email Account Hijacking – Part 3 Extending the Exploit

On Monday and Wednesday we looked at email account hijacking, how it happens, and what can happen after the account is controlled by an attacker.  Today we will see how an attacker could use the beachhead they established in your email account to extend their intrusion.

They have already proven that you are susceptible to phishing and other social engineering exploits.  So sending the victim other phishing emails that allow more ...

Continue Reading →
0
Page 171 of 278 «...140150160169170171172173...»