In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…Read more
Reading Time: ~2 min.Amazon User Receives Thousands of Alexa-Recorded Messages Upon requesting all his user data from Amazon, one user promptly received over 1,700 recorded messages from an Alexa device. Unfortunately, the individual didn’t own such a device. The messages were from a device belonging to complete stranger, and some of them could have easily been used to find […]
The post Cyber News Rundown: Amazon User Receives Thousands of Alexa-Recorded Messages appeared first on Webroot Blog.Read more
Often businesses have no clue about a breach that happens through employees, but is believed to be because of external threats. Having an endpoint security software on your company network is a smart measure to secure your sensitive data and root out the bad employees.
The post How to Spot the Wrong Employee through Employee Tracking? appeared first on REVE Antivirus.Read more
As a normal user we receive multiple emails on a daily basis with PDF as an attachment. Recently, at Quick-Heal Security Lab, we observed a malicious PDF file sent to users as an attachment via a phishing mail. These PDF files look like a regular document but that’s not the…Read more
Hackers having sharp attacking techniques find it quite lucrative to get into the personal lives of people and break out publically. Not just ordinary internet users like you and me, renowned celebrities have been victims of online privacy leaks too.
The post Online Privacy Leaks – How to Avoid Personal Information Exposure? appeared first on REVE Antivirus.Read more
A recap of some of the best stories of the year in cyber security from SymantecRead more
Reading Time: ~5 min.The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. Continued Growth of Cryptojacking “Cryptojacking will continue […]Read more
Reading Time: ~2 min.Facebook API Bug Reveals Photos from 6.8 Million Users Facebook announced this week that an API bug had been found that allowed third-party apps to access all user photos, rather than only those posted to their timeline. The vulnerability was only available for 12 days in mid-September, but could still impact up to 6.8 million […]
The post Cyber News Rundown: Facebook Bug Exposes User Photos appeared first on Webroot Blog.Read more
Quick Heal Security Lab has spotted few FakeApps with more than 50,000+ installations on Google Play Store. These applications appear to be genuine as a PDF reader, PDF Downloader, PDF Scanner etc., but don’t have such functionality. The main purpose of these apps is to increase the download count of…Read more
Improving response by integrating security information from Symantec’s products into Demisto’s orchestration, automation, and responseRead more