Categories
Security

We are more ready for IPv6 email than we may think

Though IPv6 is gradually replacing IPv4 on the Internet’s network layer, email is lagging behind, the difficulty in blocking spam sent over IPv6 cited as a reason not to move. But would we really have such a hard time blocking spam sent over IPv6?
Read more on Virus Bulletin’s blog.

Categories
Security

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.
Read more on Virus Bulletin’s blog.

Categories
Security

How TSB's simple tech issue became a big phishing problem

Security is a top priority for financial institutions around the world. In the past few weeks, the U.K.โ€™s TSB Bank has learned the hard way that availability is even more important. And when availability is an issue, security canโ€™t be ignored.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

Hide'n'Seek IoT botnet adds persistence

The Hide’n’Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.
Read more on Virus Bulletin’s blog.

Categories
Security

How cryptocurrency is killing the 'money mule'

A new strain of malware that targets cryptocurrency users โ€” but not users of mainstream payment options like bank accounts โ€” highlights how much the cybercrime game is changing behind the scenes.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

RSA 2018: the good, the bad, the ugly, the great and the fantastic

In April, I attended the RSA Expo in San Francisco. I shared my views on the expo and the industry.
Read more on Virus Bulletin’s blog.

Categories
Security

GravityRAT malware takes your system's temperature

The GravityRAT malware, discovered by Cisco Talos researchers, gives some interesting insight into modern malware development.
Read more on Virus Bulletin’s blog.

Categories
Security

How malware can sneak in through M&A

Companies that handle sensitive customer data have even more to worry about when making an acquisition. Not only do they have to be sure the acquired company has good security, but they can’t let their guard down even after the acquisition closes.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

$150k in cryptocurrency stolen through combined BGP-DNS hijack

A BGP hijack was used to take over some of Amazon’s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.
Read more on Virus Bulletin’s blog.

Categories
Security

Security-focused routers may help to mitigate IoT threats

Various security companies are offering security-focused routers. This is a good trend and may help mitigate a lot of the issues that come with the IoT.
Read more on Virus Bulletin’s blog.