Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how smart home devices can be easily hacked and 11 vulnerabilities that could affect medical devices and hospital networks. Also, read about why AI could be vital to your security future and a massive Zynga breach affecting more than 200 million players.
The hard truth is that identity data is the new gold—and criminal panhandlers are constantly mining for the sale and distribution of data on the Dark Web. But what can we as digital citizens do to protect ourselves? Trend Micro’s recent blog post describes how to keep yourself and your data safe.
Trend Micro was cited as a leader with the second-highest score in the current offering category in The Forrester Wave: Endpoint Security Suites, Q3 2019 report. Trend received the highest possible score for Corporate Vision and Focus (a criterion under the Strategy category), a recognition of stable leadership, innovative technology and high-quality product management and development.
Trend Micro found a new modular fileless botnet malware called Novter that the KovCoreG campaign has been distributing since March. KovCoreG is known for using the Kovter botnet malware through malvertisements and exploit kits to commit click fraud.
With businesses of all sizes keen to ensure they don’t become the next big-name security attack victim, the need to stay on top of your data could be central to staying safe from the latest threats. Cybercrime tactics have become more professional and business-like in recent years, keeping them one step ahead of the game.
According to a recent report, a hacker was able to hack into a couple’s Nest security system, control their thermostat and talk to them via their camera. According to the report, changing their Wi-Fi password wasn’t enough to keep the hacker away and disturbances only stopped after changing the network ID. Read up on how to protect your smart home and IoT devices in Trend Micro’s analysis.
The industrial internet of things (IIoT) has rapidly transformed the network and data infrastructure in health and medicine. However, rapid adoption of IIoT is not without risks. Healthcare stakeholders must first understand the dangers it brings to the field when haphazardly implemented. Read more about addressing IIoT risks in healthcare in Trend Micro’s blog.
A giant botnet and banking trojan malware operation has infected hundreds of thousands of Android users since at least 2016 – but mistakes by the group have revealed details of the campaign and how they operate.
Security researcher axi0mX discovered “checkm8,” an exploit that could allow the jailbreak of millions of iOS devices. The exploit lies in the bootrom of the affected devices, which in turn is located on a read-only memory chip. This renders the exploit unpatchable and the resulting jailbreak permanent.
A vulnerability involving the message transfer agent Exim — estimated to run roughly 57% of all email servers — has been discovered by security researchers from QAX-A-Team. Exploitation of the bug, assigned CVE-2019-16928, could result in threat actors being able to launch denial-of-service (DoS) or remote code execution (RCE) attacks.
Publisher Zynga announced there was a data breach of account login info for Draw Something and Words with Friends players on Sept. 12. A hacker that goes by the name of Gnosticplayers said they stole data from over 218 million Words with Friends player accounts.
The Food and Drug Administration (FDA) notified patients, healthcare professionals, and other stakeholders, warning them of a set of 11 vulnerabilities that could put medical devices and hospital networks at risk. The set of vulnerabilities was dubbed “URGENT/11,” and was discovered in a decade-old third-party software component called IPnet.
The second annual CloudSec event hosted by Trend Micro last week yielded valuable insight from industry leaders both on stage and during breakout sessions. Trend’s Mark Nunnikhoven, vice president of cloud research, discusses Canada’s position in the cloud adoption race.
A zero-day attack exploits an unpatched vulnerability and could significantly affect organizations using vulnerable systems. Trend Micro provides an overview detailing what businesses need to know about zero-day vulnerabilities so they can better mitigate the risks and the threats that exploit them.
Were you aware that smart home devices could be hacked? Will it affect your decision to buy smart home devices in the future? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.