Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
The health care industry continues to be a major target of attacks, with stolen electronic health records generating lucrative profits for data thieves and ransomware attacks often leaving affected hospitals no recourse but to pay, according to two reports released in the past week.
It’s very common to read about malware pilfering all kinds of confidential data from computers — spreadsheets, documents, databases, pictures. Researchers have uncovered a new malware campaign that takes things a step further.
Android users who recently downloaded the Good Weather app received quite a bit more than just a weather forecast: primarily having their mobile banking app compromised. To accomplish this task, cybercriminals weaponized the Android weather app Good Weather by making it a Trojan.
Earlier this year, Action Fraud, the UK’s fraud and cybercrime reporting center, issued a warning that cyber criminals were taking advantage of generous individuals by sending phishing emails purportedly from Migrant Helpline, a charity organization dedicated to assisting migrants across the country.
Air-gapped computers aren’t physically connected to any network and so should be protected from remote hackers. However, Stuxnet showed air-gaps can be breached. Besides that, an insider could always insert a USB drive into an air-gapped computer.
Britain’s National Crime Agency (NCA) has arrested a suspect in connection with last year’s cyber attack which infected nearly 1 million Deutsche Telekom routers, German federal police said on Thursday. The NCA arrested the 29-year-old Briton at one of London’s airports on Wednesday, the police said in a statement.
To an ordinary user, securing a computer can be a nearly impossible task. Just figuring out what to watch out for can be a challenge in itself. What are the threats that should matter to ordinary, everyday users and what can they do to avoid them?
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.