• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Current News   »   This Week in Security News

This Week in Security News

  • Posted on:August 18, 2017
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week! 

 

Vulnerabilities Are Affecting the CAN Standard of Connected Cars

In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. 

There Are Benefits to Knowing Information Security Breach Attribution

Earlier this week the iSMG Fraud and Breach Prevention Summit in New York City featured a fascinating conversation on the value of attribution, led by Gartner’s Avivah Litan. The panel was called: “Moving from Indicators of Compromise to Indicators of Attack: But Will Attacker Attribution Really Help Us?” 

GhostClicker Adware is a Phantomlike Android Click Fraud

We’ve uncovered a pervasive auto-clicking adware from as much as 340 apps from Google Play, one of which, named “Aladdin’s Adventure’s World”, was downloaded 5 million times. While the majority of the said apps have been taken down, 101 were still downloadable as of August 7, 2017. 

ZDI Published Two 0-Day Advisories for Vulnerabilities in Foxit

The beauty of these vulnerabilities is their simplicity by nature, and that they are not memory corruption vulnerabilities. To be exact, they are Command Injection and File Write vulnerabilities that can be triggered through the JavaScript API in Foxit Reader. 

Locky Ransomware Is Back

One of the most successful families of ransomware has returned once again, with a new email spam campaign. Locky was one of the first major forms of ransomware to become globally successful and at one point was one of the most common forms of malware. 

HBO’s Twitter Accounts Were Hacked in Latest Cyberattack

Premium cable channel HBO has fallen victim yet again to a hacker attack. This time its official Twitter account was broken into, along with accounts for several of its most popular shows. A group calling itself OurMine gained control of HBO’s main account Wednesday night, according to reports. 

AWS Launched a New Service Called Amazon Macie

At the AWS Summit in New York City, AWS launched a new service: Amazon Macie. Trend Micro is proud to support this exciting new service at launch. Amazon Macie provides automated insights into the usage of your Amazon S3 data. 

Disdain Exploit Kit Detected in the Wild

On August 9, we detected a new exploit kit in the wild, being distributed through a malvertising campaign. With additional analysis of the code and activity, we can confirm that it is the Disdain exploit kit, which started to advertise their services in underground forums starting August 8. 

Scottish Parliament Says the Ongoing ‘Brute-Force’ Cyberattack Has Not Breached Defenses

Scotland’s devolved parliament is suffering an ongoing brute-force cyberattack but the attack has not breached the assembly’s IT defenses, it said on Wednesday. Hackers are becoming more and more adept at developing or finding malware to wipe data on computers, making them inoperable. 

Not All Hacking Requires a Computer

Why spend days or weeks trying to bust into a network when you could pick up a phone? Exploiting vulnerabilities of a company can simply involve picking up a phone, chatting with a few people or memorizing a few tones. 

Cybersecurity Experts Are Finding Common Ground

Data breaches and cyberattacks can be extremely damaging to businesses and to people’s personal and professional lives. But, IT pros and policymakers focusing on cybersecurity often don’t speak the same language. Discover how these cybersecurity experts are finding common ground. 

Hackers of the Future Could Use Malware Stored in DNA to Infect Computers

Researchers from the University of Washington have figured out a way to take over a computer by encoding malicious software into physical strands of DNA. In its most basic form, the DNA is a way of storing information, and its strands are made from four building blocks — A, C, G, and T. 

Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.

Related posts:

  1. This Week in Security News
  2. This Week in Security News
  3. This Week in Security News
  4. This Week in Security News

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.