Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Trend Micro has identified more malicious Android apps abusing the name of the popular mobile game Super Mario Run. We earlier reported about how fake apps were using the app’s popularity to spread; attackers have now released versions of these fake apps that steal the user’s credit card information.
Despite being one of the oldest Point-of-Sale (PoS) RAM scraper malware families out in the wild, RawPOS (detected by Trend Micro as TSPY_RAWPOS) is still very active today, with the threat actors behind it primarily focusing on the lucrative multibillion-dollar hospitality industry.
Global hotel chain InterContinental Hotels Group Plc said 1,200 of its franchised hotels in the United States, including Holiday Inn and Crowne Plaza, were victims of a three-month cyberattack that sought to steal customer payment card data.
Several hacking tools and exploits targeting systems and servers running Microsoft Windows were leaked by hacking group Shadow Brokers. Several of these were reportedly tools targeting financial organizations worldwide.
Through this entry, in which we take a closer look at an individual who we believe might be connected to the Winnti group, we hope to give both ordinary users and organizations better insights into some of the tools these kinds of threat actors use, as well as the scale in which they operate.
A new kind of attack is targeting unsecured Internet of Things devices by scrambling their code and rendering them useless. Reminiscent of the Mirai botnet that brought down large swathes of the US internet last year, this new malware targets poorly secured Internet of Things devices.
Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicious programs are becoming more sophisticated, and in turn, they’re harder to detect and mitigate quickly.
Mobile devices have been commonly used in corporate environments for decades – bulky portable telephones, heavy laptops and PDAs. Then along came Apple and the smartphone, and soon everyone either had a personal smartphone or expected their employers to provide one.
Hong Kong plans to toughen information security rules after a series of embarrassing hacks at the city’s brokers, the securities regulator said on Thursday. The draft rules would likely include requirements for two-step authentication for account log-in.
Recently “Hybrid Cloud” has bubbled up more and more. The good news here is that the term is an accurate and useful way to describe the reality that most organizations are facing…and will continue to face for the foreseeable future.
Docker’s popularity has been explosive, with thousands of organizations using its platform to modernize applications, build microservices, optimize infrastructure and embrace a true DevOps practice. Like any transformation, moving to Docker is a journey for an organization.
Worldwide, demand for UUV units is expected to grow by 49 percent from 2016 to 2020. The laws of physics still constrain communications: high-speed wireless “underwater internet” of the type that is now pervasive in the world’s cities is still just theory, but the technology is developing very fast.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.