Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
There is a dark side to couponing: fraud. While seemingly a mild form of fraud, wide-spread coupon fraud can add up. PennLive put realistic estimates of coupon crime costs between $300 – 600 million per year in the U.S. While losses will vary per organization, this is still no small price to pay for any business.
Since 2000, there’s been a vulnerable component in the equation editor, which allows you to insert complex mathematical expressions into your documents. It’s a feature most users never touch, but a well-executed attack could allow a hacker to launch malicious code on a vulnerable machine.
A sophisticated form of malware based on the notorious Zeus trojan and originally designed to steal banking credentials has returned with new espionage capabilities which allow it to monitor and modify Facebook and Twitter posts, as well as the ability to eavesdrop on emails.
Trend Micro recently discovered that EMOTET has a new iteration with a few changes in its usual behavior and new routines that allow it to elude sandbox and malware analysis. Based on its findings, EMOTET’s dropper changed from using RunPE to exploiting CreateTimerQueueTimer.
As Americans begin to worry more about cybercrime than the conventional kind, researchers warn users to remain cautious of both, as stolen iPhones are so valuable in criminal circles that they can go for as much as $2,100 in some countries.
Security researchers have demonstrated that with a simple program run from any computer in Wi-Fi range, that the internet enabled camera called Cloud Cam, can be not only disabled, but frozen. A viewer watching its live or recorded stream sees only a closed door, even as their actual door is opened.
A new banking trojan called IcedID, spotted by researchers last September, has been wreaking havoc among financial institutions across the US, UK and Canada, including banks, payment card providers, mobile services providers, as well as e-commerce sites.
Young cybersecurity professionals need to overcome the gap between what is learned in a classroom and the practical experience required to protect real, critical business data. Trend Micro’s annual Capture the Flag (CTF) competition works to bridge this gap.
As Q4 begins in earnest, now is the time to start making considerations for next year’s budgets. This is especially true for the company’s IT and cyber security budgets – a difficult decision with so many robust technologies and new threats emerging. Check out top considerations for next year’s budget.
Are you working for a US-based firm that holds personal information about European Union or Swiss citizens? If so, you should do three things. 1) Opt in to the Privacy Shield. 2) Put a Data Protection Officer in place. 3) Ensure your IAM solution is comprehensive and effective.
A North Korean radio station was reportedly hijacked by an unknown hacker to play the 1980’s hit song “The Final Countdown”. The short-wave radio station, 6400kHz is allegedly run from the North Korean city Kanggye and is known to be used by Pyongyang to transmit secret codes.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.