Living off another land: Ransomware borrows vulnerable driver to remove security software

Credit to Author: Andrew Brandt| Date: Thu, 06 Feb 2020 15:22:24 +0000

Sophos has been investigating two different ransomware attacks where the adversaries deployed a legitimate, digitally signed hardware driver in order to delete security products from the targeted computers just prior to performing the destructive file encryption portion of the attack. The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/uepwaOU8_Ek” height=”1″ width=”1″ alt=””/>

Read more

Update now – WhatsApp flaw gave attackers access to local files

Credit to Author: John E Dunn| Date: Thu, 06 Feb 2020 15:39:57 +0000

The flaw affecting WhatsApp’s desktop client when it’s paired with the iPhone app allowed attackers access to local file systems.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/z97jnHoyCbQ” height=”1″ width=”1″ alt=””/>

Read more

Is Apple's iCloud folder sharing a shadow IT problem?

Credit to Author: Jonny Evans| Date: Thu, 06 Feb 2020 06:35:00 -0800

After a long delay, Apple is preparing to introduce iCloud Folder Sharing across both its Mac and iOS platforms. This is a big blessing for collaboration, but is it safe?

What is iCloud Folder Sharing?

iCloud Folder Sharing was first announced at WWDC 2019, but delayed until – well, at present it is still delayed and was only recently made available inside the latest iOS and macOS developer betas. Which means it should be on the way.

Probably.

How it works?

To read this article in full, please click here

Read more

Twitter bans deepfakes, but only those ‘likely to cause harm’

Credit to Author: Lisa Vaas| Date: Thu, 06 Feb 2020 13:52:30 +0000

Twitter isn’t interested in how the “synthetic or manipulated” media is created, but if it has the potential to cause harm it’ll be removed.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/6IJPjMtC2sA” height=”1″ width=”1″ alt=””/>

Read more

Google’s Chrome 80 clamps down on cookies and notification spam

Credit to Author: Danny Bradbury| Date: Thu, 06 Feb 2020 12:14:48 +0000

Version 80 of the Chrome browser is out with some new features designed to save your security and your sanity.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/yYDlj-wH94I” height=”1″ width=”1″ alt=””/>

Read more

Android pulls 24 ‘dangerous’ malware-filled apps from Play Store

Credit to Author: Lisa Vaas| Date: Thu, 06 Feb 2020 11:35:36 +0000

The malware-infected apps used to harvest data and sign users up to premium services have been downloaded more than 382 million times.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/8tR9brfQrYs” height=”1″ width=”1″ alt=””/>

Read more

When Your Used Car is a Little Too ‘Mobile’

Credit to Author: BrianKrebs| Date: Thu, 06 Feb 2020 00:44:26 +0000

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start the engine. But who exactly owns that control is not always clear when these smart cars are sold or leased anew. Here’s the story of one former electric vehicle owner who discovered he could still gain remote, online access to his old automobile years after his lease ended.

Read more