Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Kaspersky security t ...

 Business

Mobile apps that handle confidential user information should run in a trusted environment — and were talking about more than just banking apps. Aside from money, cybercriminals also seek out loyalty program points, discount cards, cryptocurrency wallets, and more. The creators of such apps can never know how   show more ...

protected a users device is or how prepared any users are for cyberthreats. Instead of simply hoping your customers use mobile security solutions, you can proactively equip your development with additional user-protection technologies. Here are our top 5 reasons to do so. 1. Malicious software An ever-present threat, malware may come from whatever source the user uses to install apps on their phone or tablet. Even using official app stores is no guarantee of safety. Attackers have become especially inventive in recent years, and modern spyware includes a range of advanced features. Depending on the variety, malware can intercept app notifications, text messages, PIN codes, and screen-lock patterns; steal 2FA codes for Google Authenticator and the like; and share what is happening on the victims screen in real time. Malware capable of overlaying app windows with its own warrants a separate mention. Such programs can, for example, copy the interface of your solution and add fake login fields for stealing credentials. 2. Unknown Wi-Fi networks You cannot know which networks app users will connect to. Just about every café and mode of transportation now offers its own Wi-Fi network to all and sundry, and anyone on the same network can try to intercept the data exchange between your app and the server, thus gaining access to the customers account. In some cases, cybercriminals set up their own wireless networks and deliberately leave them open to lure in users. 3. Remote access tools An entire class of programs exists for the purpose of gaining complete control over users devices. RATs, or Remote Access Tools, are not necessarily malware (although some are) and may be included with legitimate apps. The access they provide can give cybercriminals remote access to the device, however, including the ability to change security settings, read any information on a device, and even use any app — including yours. 4. Browser vulnerabilities In many cases, mobile apps are based on elements of a regular Web browser, plus or minus various functions. With browser engine vulnerabilities found regularly, mobile app developers periodically need to update their solutions. In the space between a vulnerabilitys discovery and its fix, however, cybercriminals can try to attack through browser vulnerabilities in your app. 5. Phishing Cybercriminals include phishers, who send links to malicious sites by e-mail, messaging apps, and text messages. Of course, attackers can try to copy the website of any company, but if they happen to target your users, luring them to a website that looks like yours or sending messages that appear to come from your company, yours is the reputation that can get stained. Why user protection is in your interest — and how to ensure it Formally, the threats weve listed hurt end users, not the companies that provide apps — at least, directly. Dig just a bit deeper and application operator losses become very clear. After all, the more cyberincidents, the greater the load on technical support; and in complicated scenarios, cases can end up in court, where even if you are not guilty or culpable, defending yourself will nonetheless require significant amounts of money. In addition, even if you prove your case, you are likely to lose a client, or worse: In this age of social media, news of even one incident can spread quickly and cause serious damage to a companys reputation. Playing it safe and ensuring protection of your customers in advance makes good sense. Our arsenal includes Kaspersky Mobile Security SDK, for adding security features to any mobile app, an antivirus engine, and technologies with access to Kaspersky cloud services for real-time information about the reputation of files, Web pages, and public Wi-Fi networks. You can learn more about Kaspersky Mobile Security SDK on the solution's dedicated page.

 Incident Response, Learnings

It seems Nikolas Sharp undertook to put about $2m into his pocket via a data theft and extortion effort, with a twist of “whistleblower” claims thrown in to confuse investigators for self-exoneration.

 Incident Response, Learnings

Microsoft revealed that its Digital Crimes Unit won court approval to take over websites used by a Chinese gang to attack targets globally – often by exploiting vulnerabilities in Microsoft products.

 Expert Blogs and Opinion

The threat and the impacts are shared: our adversaries target everyone and cybercriminals ransom and hold hostage our businesses, and threaten critical infrastructure relied upon by millions.

 Security Culture

Iowa State University and the University of Illinois at Urbana-Champaign will lead a coalition of industry and government partners to train professionals to grow the Midwest's cybersecurity workforce.

 Feed

Red Hat Security Advisory 2021-4975-02 - The RPM Package Manager is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2021-4971-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Ubuntu Security Notice 5179-1 - It was discovered that BusyBox incorrectly handled certain malformed gzip archives. If a user or automated system were tricked into processing a specially crafted gzip archive, a remote attacker could use this issue to cause BusyBox to crash, resulting in a denial of service, or   show more ...

possibly execute arbitrary code. It was discovered that BusyBox incorrectly handled certain malformed LZMA archives. If a user or automated system were tricked into processing a specially crafted LZMA archive, a remote attacker could use this issue to cause BusyBox to crash, resulting in a denial of service, or possibly leak sensitive information. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 5178-1 - Sjoerd Job Postmus and TengMA discovered that Django incorrectly handled URLs with trailing newlines. A remote attacker could possibly use this issue to bypass certain access controls.

 Feed

Ubuntu Security Notice 5170-1 - A security issue was discovered in MariaDB and this update includes new upstream MariaDB versions to fix the issue. MariaDB has been updated to 10.3.32 in Ubuntu 20.04 LTS and to 10.5.13 in Ubuntu 21.04 and Ubuntu 21.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

 Feed

Mozilla is beginning to roll out Firefox 95 with a new sandboxing technology called RLBox that prevents untrusted code and other security vulnerabilities from causing "accidental defects as well as supply-chain attacks." Dubbed "RLBox" and implemented in collaboration with researchers at the University of California San Diego and the University of Texas, the improved protection mechanism is

 Feed

Microsoft on Monday announced the seizure of 42 domains used by a China-based cyber espionage group that set its sights on organizations in the U.S. and 28 other countries pursuant to a legal warrant issued by a federal court in the U.S. state of Virginia. The Redmond company attributed the malicious activities to a group it pursues as Nickel, and by the wider cybersecurity industry under the

 Feed

Cybersecurity researchers have disclosed multiple vulnerabilities in a third-party driver software developed by Eltima that have been "unwittingly inherited" by cloud desktop solutions like Amazon Workspaces, Accops, and NoMachine and could provide attackers a path to perform an array of malicious activities. "These vulnerabilities allow attackers to escalate privileges enabling them to disable

 Feed

Nobelium, the threat actor attributed to the massive SolarWinds supply chain compromise, has been once again linked to a series of attacks targeting multiple cloud solution providers, services, and reseller companies, as the hacking group continues to refine and retool its tactics at an alarming pace in response to public disclosures. The intrusions, which are being tracked by Mandiant under two

2021-12
Aggregator history
Tuesday, December 07
WED
THU
FRI
SAT
SUN
MON
TUE
DecemberJanuaryFebruary