Hiding malware downloads in Taylor Swift pics! New SophosLabs report

Credit to Author: Paul Ducklin| Date: Thu, 19 Dec 2019 16:03:43 +0000

Just because a malware family isn’t all over the headlines doesn’t mean it isn’t interesting… or important… or dangerous!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Axkezd1BhWc” height=”1″ width=”1″ alt=””/>

Read more

Get in line! 38,000 students and staff forced to queue for new passwords

Credit to Author: Lisa Vaas| Date: Thu, 19 Dec 2019 11:25:53 +0000

It’s not a bread line, and it’s not a line to see Santa – it’s an analog response to a nasty cyber attack.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Iubgv-x9nTA” height=”1″ width=”1″ alt=””/>

Read more

Ransomware-seized New Orleans declares state of emergency

Credit to Author: Lisa Vaas| Date: Tue, 17 Dec 2019 12:14:47 +0000

There are signs that the attackers used the particularly pernicious Ryuk strain of ransomware.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/_IFQ_O3lT1A” height=”1″ width=”1″ alt=””/>

Read more

The usual suspects

Credit to Author: Sharky| Date: Fri, 13 Dec 2019 03:00:00 -0800

One morning Wilma, the print shop manager at a beer distributor, discovers that her computer has a virus. It’s no big deal — sometimes bad things happen to good computers — so she cleans up the system and gets on with her day.

But a few days later the system is infected again.

Considerably more annoyed this time, she contacts Betty (the company’s sole IT person) to get some assistance and make sure the system is 100% clean. After disinfecting the system, Betty checks the browser history and finds that someone has been making late-night visits to X-rated websites.

The question then becomes, Who is using company resources to watch porn? At most companies, suspicion would immediately fall on the nighttime cleaning crew. But the print shop is located in the warehouse, to which the cleaning crew doesn’t have access.

To read this article in full, please click here

Read more

Facebook suing ILikeAd for hijacking users’ ad accounts

Credit to Author: Lisa Vaas| Date: Mon, 09 Dec 2019 11:46:38 +0000

Facebook says the company used celeb bait links to infect victims with malware and hijacked their ad accounts to sell diet pills.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/PXMa1EXeC34″ height=”1″ width=”1″ alt=””/>

Read more

$5m bounty set on the alleged head of Evil Corp banking Trojan group

Credit to Author: Lisa Vaas| Date: Mon, 09 Dec 2019 10:53:32 +0000

Know where Maksim “Aqua” Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/nU-wUMypTSA” height=”1″ width=”1″ alt=””/>

Read more

Mac users targetted by Lazarus ‘fileless’ Trojan

Credit to Author: John E Dunn| Date: Fri, 06 Dec 2019 13:18:09 +0000

The Lazarus hacking group are trying to sneak a ‘fileless’ Trojan on to Apple computers, disguised as a fake cryptocurrency trading program.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/GN789RKuVrQ” height=”1″ width=”1″ alt=””/>

Read more

Machine-raiding Python libraries squashed by community

Credit to Author: Danny Bradbury| Date: Thu, 05 Dec 2019 16:55:04 +0000

Python developers have once again fallen victim to malicious software libraries lurking in their favourite package manager.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/84sg5-2L6eI” height=”1″ width=”1″ alt=””/>

Read more