Cybersecurity News Blog

Invisible Man malware lifts banking credentials by abusing Android accessibility services

Invisible Man malware lifts banking credentials by abusing Android accessibility services

A family of malware known as “Invisible Man” abuses Android OS accessibility services in order to steal users’ banking credentials. Invisible Man, also known as “Svpeng”, has earned quite a reputation for itself in...

Flush times for hackers in booming cyber security job market

Flush times for hackers in booming cyber security job market

LAS VEGAS (Reuters) – The surge in far-flung and destructive cyber attacks is not good for national security, but for an increasing number of hackers and researchers, it is great for job security. The...

White House ‘rumoured to close State Department’s only cyber security office’ as top diplomat quits

White House ‘rumoured to close State Department’s only cyber security office’ as top diplomat quits

It has been reported that the cyber security office in the State Department may be closed as its top diplomat quits. Christopher Painter, the Coordinator for Cyber Issues, is leaving his post at the...

AUSTRALIAN COMPANIES UNDER ‘CONSTANT’ CYBER ATTACK, SAYS SECURITY COMPANY CROWDSTRIKE

AUSTRALIAN COMPANIES UNDER ‘CONSTANT’ CYBER ATTACK, SAYS SECURITY COMPANY CROWDSTRIKE

Fancy Bear, Deep Panda and Charming Kitten are faces of cyber warfare. The characters were created by cybersecurity company Crowdstrike to represent the so-called “threat actors” roaming the internet. “These are the actors who...

MICROSOFT TO REMOVE SMB1 PROTOCOL – USED BY WANNACRY – FROM WINDOWS 10

MICROSOFT TO REMOVE SMB1 PROTOCOL – USED BY WANNACRY – FROM WINDOWS 10

In the latest Windows 10 Build 16226 for Home and Professional editions, the client side of SMB1 remains to enable users to connect to devices still using the decades-old protocol. All Enterprise and Education editions...

THE BEHAVIORAL ECONOMICS OF WHY EXECUTIVES UNDERINVEST IN CYBERSECURITY

THE BEHAVIORAL ECONOMICS OF WHY EXECUTIVES UNDERINVEST IN CYBERSECURITY

Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as an enigma shrouded in mystery. The digital threat landscape changes constantly, and it’s very difficult...

CHINA’S CYBER SECURITY LAW: THE IMPOSSIBILITY OF COMPLIANCE

CHINA’S CYBER SECURITY LAW: THE IMPOSSIBILITY OF COMPLIANCE

SHANGHAI – China’s much-anticipated Cyber Security Law (CSL) will come into effect on 1 June 2017.  The new law is the first comprehensive law to address cyber security concerns at the national level and to...

WINDOWS 7 HARDEST HIT BY WANNACRY WORM

WINDOWS 7 HARDEST HIT BY WANNACRY WORM

The majority of machines hit by the WannaCry ransomware worm in the cyber-attack earlier this month were running Windows 7, security firms suggest. More than 97% of the infections seen by Kaspersky Lab and...

USB DRIVES CONTAINING IBM TOOL FOUND INFECTED WITH MALICIOUS CODE

USB DRIVES CONTAINING IBM TOOL FOUND INFECTED WITH MALICIOUS CODE

IBM issued a support advisory last week warning users that some USB flash drives containing the company’s Storwize initialization tool include a file infected with malicious code. Source: SC Mag Read the full story >

DATA OF UP TO 1M AUTO LOAN CUSTOMERS ACROSS U.S. EXPOSED

DATA OF UP TO 1M AUTO LOAN CUSTOMERS ACROSS U.S. EXPOSED

An unsecured database left exposed on an Amazon server, possibly for two years, revealed names, addresses, credit scores and parts of Social Security numbers (SSNs) of up to one million applicants for car loans,...