The Week in Security Week

  • 0

The Week in Security Week

Category : Trend Micro

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!

Coupon Fraud Could be Costing Your Business Millions

There is a dark side to couponing: fraud. While seemingly a mild form of fraud, wide-spread coupon fraud can add up. PennLive put realistic estimates of coupon crime costs between $300 – 600 million per year in the U.S. While losses will vary per organization, this is still no small price to pay for any business.

Microsoft Just Fixed a 17 Year Old Security Flaw in Office

Since 2000, there’s been a vulnerable component in the equation editor, which allows you to insert complex mathematical expressions into your documents. It’s a feature most users never touch, but a well-executed attack could allow a hacker to launch malicious code on a vulnerable machine.

New Banking Malware Variant Wants to Scoop up Your Email and Social Media Accounts

A sophisticated form of malware based on the notorious Zeus trojan and originally designed to steal banking credentials has returned with new espionage capabilities which allow it to monitor and modify Facebook and Twitter posts, as well as the ability to eavesdrop on emails.

New EMOTET Hijacks Windows API

Trend Micro recently discovered that EMOTET has a new iteration with a few changes in its usual behavior and new routines that allow it to elude sandbox and malware analysis. Based on its findings, EMOTET’s dropper changed from using RunPE to exploiting CreateTimerQueueTimer.

Cybercriminals Are Gaining Access to iCloud Accounts Through Phishing Emails

As Americans begin to worry more about cybercrime than the conventional kind, researchers warn users to remain cautious of both, as stolen iPhones are so valuable in criminal circles that they can go for as much as $2,100 in some countries.

Amazon Key Flaw Could Let Rogue Deliverymen Disable Your Camera

Security researchers have demonstrated that with a simple program run from any computer in Wi-Fi range, that the internet enabled camera called Cloud Cam, can be not only disabled, but frozen. A viewer watching its live or recorded stream sees only a closed door, even as their actual door is opened.

IcedID Banking Trojan Targets US Financial Institutions

A new banking trojan called IcedID, spotted by researchers last September, has been wreaking havoc among financial institutions across the US, UK and Canada, including banks, payment card providers, mobile services providers, as well as e-commerce sites.

Trend Micro’s Capture the Flag Competition Provides Young Pros Real-World Experience

Young cybersecurity professionals need to overcome the gap between what is learned in a classroom and the practical experience required to protect real, critical business data. Trend Micro’s annual Capture the Flag (CTF) competition works to bridge this gap.

Budget for Cybersecurity in 2018

As Q4 begins in earnest, now is the time to start making considerations for next year’s budgets. This is especially true for the company’s IT and cyber security budgets – a difficult decision with so many robust technologies and new threats emerging. Check out top considerations for next year’s budget.

Pursue the Right to be Left Alone

Are you working for a US-based firm that holds personal information about European Union or Swiss citizens? If so, you should do three things. 1) Opt in to the Privacy Shield. 2) Put a Data Protection Officer in place. 3) Ensure your IAM solution is comprehensive and effective.

Hacker Hijacks North Korean Radio Station and Plays ‘The Final Countdown’

A North Korean radio station was reportedly hijacked by an unknown hacker to play the 1980’s hit song “The Final Countdown”. The short-wave radio station, 6400kHz is allegedly run from the North Korean city Kanggye and is known to be used by Pyongyang to transmit secret codes.


Author: Jon Clay

Leave a Reply