Just in case you havent noticed, Qatar is currently hosting the 22nd FIFA World Cup (from November 20 to December 18). Cyberfraudsters could hardly pass up such an opportunity. The 2018 World Cup in Russia was watched by 3.6 billion people (more than half of the worlds population over four years old), and the viewing show more ...
figures of Qatars World Cup are unlikely to be lower. Having analyzed the main cyberthreats targeting fans at major sporting events in recent years, we can only recommend you be vigilant during the World Cup. Fake sites and apps In the runup to all major sporting feasts in recent years, our experts have observed upticks in registrations of domains based on the names of the respective events. Most of these sites were used for fraud, such as offering fake tickets or free live broadcasts. A phishing page offers a chance to win 2 FIFA tickets This years World Cup has been no exception. By the time it kicked off, experts had uncovered multiple fraudulent pages on social networks, and more than 170 domains posing as official World Cup resources. Most are phishing sites looking to steal user data, but alongside the traditional scams (ticket giveaways, souvenir sales), some new cryptocurrency-based scams have been added. Soccer fans are invited to invest in new tokens created specially for the tournament, or to bet on the results with payouts in crypto or as NFT art. Of course, to receive your winnings, you have to share your cryptowallet details. An example of a World Cup-related crypto scam Mobile apps are another classic mode of attack, especially on Android users: by the start of the World Cup, more than 50 instances of mobile malware had been detected that either plant malicious software on your device, ask you to pay for a bogus ticket or broadcast, or steal your personal data — passwords, mail accounts, card numbers, and the like. Â A study of past championships indicates that the victims of sports-related scams are typically casual fans: folks looking for streaming sites or installing sports apps for the first time. Therefore, in addition to our standard advice (never visit suspicious sites or download suspicious applications), we would add another useful tip: if youre a novice, ask a friend whos long been into sports. Theyll be able to suggest the best places for live streaming or placing bets, which will help you avoid fly-by-night sites and fraudulent apps. Privacy issues But even official apps dont guarantee protection against personal data leaks. On the eve of the current World Cup, warnings were already sounding about privacy issues in apps that visitors to Qatar have to install. Similar vulnerabilities making it possible to spy on users were found in Chinese apps that guests of this years Winter Olympics were required to install. But if you think such problems affect only certain countries, alas, personal data leaks happen everywhere. At the 2020 Summer Olympics in Tokyo (which ran in 2021 due to covid disruption), the usernames and passwords of those whod bought tickets were leaked, giving cybercriminals access to masses of personal data in fans accounts: names, addresses, bank details. And in 2018, the official app of the Spanish soccer league, La Liga, was caught red-handed using microphone and GPS access on user devices to track down those watching pirated broadcasts. La Liga, of course, denied eavesdropping on users, since the audio clips it recorded were encrypted. But how could this be checked, and who then did listen to these recordings? As such, a general security rule that applies even to official apps is to minimize their access to your personal data and to other apps and systems on your smartphone. If installing an app with extended privileges is mandatory in the host country, use a burner phone instead of your main device. Beware of free Wi-Fi During the 2016 Summer Olympics in Brazil, Kaspersky researchers found that around a quarter of Wi-Fi hotspots at competition venues had little or no security at all. Similar studies during the 2018 FIFA World Cup in Russia uncovered even more unprotected Wi-Fi networks. So, if youre off to Qatar, take every precaution when using public Wi-Fi: 1. Turn off automatic connection to Wi-Fi networks Also turn off Wi-Fi itself when not using it, and remove public Wi-Fi networks from the list of connections after using them. This will safeguard against connecting to poorly protected access points where your data could be intercepted by cybercriminals. 2. Carefully check the names of networks you connect to Fake hotspots might have similar names to the Wi-Fi network of your hotel or the cafe youre in. If you fail to spot a fake Wi-Fi network and connect to it, the data you transmit will end up in cybercriminal hands. 3. Dont use public Wi-Fi for critical tasks For the same reasons, be doubly sure not to connect to dubious hotspots if you have to use a service where a data leak could be very costly, such as online banking. Better to access it through a well-protected home or corporate network. Although more expensive, even using mobile data to get online is safer than free public Wi-Fi. 4. Use a VPN If theres simply no other option but to connect to an unknown Wi-Fi network, use a security solution with VPN technology to create an encrypted communication channel. For example, Kaspersky Secure Connection. KSC encrypts your data before forwarding it to the Wi-Fi router, so other users — not even the hotspot owner — can see what youre sending or where. And its a good idea to configure your VPN to start up automatically on connecting to any public network.
When it comes to measuring the security level of a device, a checklist of security ‘low hanging fruit’ is a good place to start. But more is needed, says Mike Sheward of Particle.io The post The Future of IoT Security Standards appeared first on The Security Ledger with Paul F. Roberts. Related StoriesEpisode 240: show more ...
As Stakes Of Attacks Grow, Can Cyber Policy “Shift Right”?Episode 238: Robots Are The Next Frontier In Healthcare Cyber RiskEpisode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen
The manufacturer is working to fix a vulnerability — similar to a previous problem in Lenovo laptops — that allows threat actors to modify or disable Secure Boot settings to load malware.
Expect to see attackers expand their use of current consumer-targeting tactics while exploring new ways to target Internet users — with implications for businesses.
The enterprise's shift to the cloud means digital forensics investigators have had to adopt new remote techniques and develop custom tools to uncover and process evidence off compromised devices.
It appears that one threat actor exploited a vulnerability to obtain information on 5.4 million Twitter accounts, but others obtained even more records. Researcher Chad Loder said that there appear to be tens of millions of impacted accounts.
Reported by ESET malware researcher Martin Smolar, the security vulnerability (CVE-2022-4020) was discovered in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices.
Fake VPN apps are being used to distribute Bahamut spyware in a campaign that is active since January. The campaign is conducted by a group of the same name and the main purpose is to extract sensitive user data from devices. So far, eight versions of these malicious apps have been discovered to be distributed via a website.
Open source security initiatives might prevent large-scale vulnerabilities such as Log4j, but smaller projects pose risks without more maintainer support, industry experts say.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical flaw impacting Oracle Fusion Middleware to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation.
According to Cyble’s research published on November 24, multiple Fortinet products are affected by an alternate path flaw tracked as CVE-2022-40684, including FortiOS, FortiProxy, and FortiSwitchManager.
SharkBot returned in a new attack targeting Android users. The trojan disguised itself as a fake antivirus app on Google Play Store to steal banking information from users. Most of the affected devices belonged to users in Italy and the U.K. Despite the repeated actions taken by Google to remove malicious apps, the official Play Store app remains a go-to-attack vector for cybercriminals.
Up to $25.4 million in grants have been awarded under the second round of the Cyber Security Skills Partnership Innovation Fund, just weeks after the federal government was charged with making applicants wait for funding.
Hackers are capitalizing on a trending TikTok challenge named 'Invisible Challenge' to install malware on thousands of devices and steal their passwords, Discord accounts, and, potentially, cryptocurrency wallets.
The new directive, NIS2, will set the baseline for cybersecurity risk management measures and reporting obligations across sectors and aims to harmonize cybersecurity requirements and implementation of measures in different member states.
While the app has an overall rating of 3.4, many user reviews complain that it is fake, hijacks their phones, and generates multiple OTPs (one-time passwords) upon installation.
CloudSEK discovered an additional cluster of phishing domains registered using similar naming schemes to those reported in July to target contractors in the UAE with vendor registration, contract bidding, and other types of lures.
The hype and popularity of the FIFA World Cup has attracted audiences from across the globe. And this, in turn attracts a variety of cybercriminals, who want to exploit the huge fan following and the organizations participating, to make a quick buck.
The senders of the email allege that the attachment is some kind of payment document available exclusively to the recipient, which must be studied for a “contract meeting presentation and subsequent payments.”
Community Health Network on November 18 reported to the U.S. Department of Health and Human Services an unauthorized access/disclosure breach affecting 1.5 million individuals involving the use of website tracking code.
A cyber incident at a school district serving Toronto's outer suburbs disabled online learning for thousands of students and plunged school administration into a mainly pre-digital era.
What set WannaCry apart, however, was its use of the SMB vulnerability to replicate itself across multiple network-connected devices. This exploit effort — known as EternalBlue — took WannaCry from mildly annoying to massively problematic.
A spokesperson for the college said the attack occurred in October and law enforcement was immediately notified. The school disconnected its systems and hired outside security experts to help restore systems and investigate the incident.
The Telecom Regulatory Authority of India (TRAI) has announced a fresh crackdown on TXT spam – this time using artificial intelligence, after a previous blockchain-powered effort delivered mixed results.
The CISA urged users' attention toward a high-severity bug in Oracle Fusion Middleware that is under heavy exploitation by hackers. A hacker could completely take over Access Manager instances by abusing the flaw. The CISA has also added s Google Chrome bug that can be abused to take control of systems.
The cybersecurity researchers at Binarly recently discovered that outdated versions of the OpenSSL cryptographic library are still being used by Dell, HP, and Lenovo on their devices.
The threat landscape is constantly evolving with new ransomware. FortiGuard Labs and Cyble spotted new Cryptonite and Punisher ransomware variants. The latter targeted users in Chile. Cryptonite is a free and open-source ransomware kit that can be downloaded by anyone willing to deploy it. Punisher ransomware show more ...
was found propagating via a COVID-19 phishing website posing as a COVID-tracking app to target Chilean users.
The volume of web application and API attacks detected over the past 12 months surged by 3.5 times year-on-year in the financial services sector, the highest of any vertical, according to Akamai.
Attackers are abusing a critical authentication bypass vulnerability, tracked as CVE-2022-40684 in multiple versions of Fortinet Products, including FortiOS, FortiProxy, and FortiSwitchManager. Researchers found that there are over a hundred thousand FortiGate firewalls exposed over the internet that are likely under the scope of attackers and are exposed to the vulnerability.
This Metasploit module utilizes the Remote Control Server's protocol to deploy a payload and run it from the server. Remote Control Collection by Steppschuh version 3.1.1.12 was tested and affected at the time of the module writing.
Red Hat Security Advisory 2022-8662-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted show more ...
third party, the Kerberos key distribution center. Issues addressed include an integer overflow vulnerability.
Red Hat Security Advisory 2022-8663-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted show more ...
third party, the Kerberos key distribution center. Issues addressed include an integer overflow vulnerability.
Ubuntu Security Notice 5747-1 - It was discovered that Bind incorrectly handled large query name when using lightweight resolver protocol. A remote attacker could use this issue to consume resources, leading to a denial of service. It was discovered that Bind incorrectly handled large zone data size received via AXFR show more ...
response. A remote authenticated attacker could use this issue to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS.
Red Hat Security Advisory 2022-8626-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.17. Issues addressed include a denial of service vulnerability.
Ubuntu Security Notice 5746-1 - Behzad Najjarpour Jabbari discovered that HarfBuzz incorrectly handled certain inputs. A remote attacker could possibly use this issue to cause a denial of service.
Debian Linux Security Advisory 5291-1 - Multiple security issues were discovered in MuJS, a lightweight JavaScript interpreter, which could result in denial of service and potentially the execution of arbitrary code.
Red Hat Security Advisory 2022-8652-01 - This release of Red Hat Fuse 7.11.1 serves as a replacement for Red Hat Fuse 7.11 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include bypass, cross site scripting, denial of service, remote SQL injection, and traversal vulnerabilities.
Senior cybersecurity professionals reveal their number one frustration is the inability to continuously measure enterprise-wide security posture and identify control failures.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical flaw impacting Oracle Fusion Middleware to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2021-35587, carries a CVSS score of 9.8 and impacts Oracle Access Manager (OAM) versions 11.1.2.3.0, 12.2.1.3.0, and 12.2.1.4.0.
Ireland's Data Protection Commission (DPC) has levied fines of €265 million ($277 million) against Meta Platforms for failing to safeguard the personal data of more than half a billion users of its Facebook service, ramping up privacy enforcement against U.S. tech firms. The fines follow an inquiry initiated by the European regulator on April 14, 2021, close on the heels of a leak of a "collated
Threat actors are capitalizing on a popular TikTok challenge to trick users into downloading information-stealing malware, according to new research from Checkmarx. The trend, called Invisible Challenge, involves applying a filter known as Invisible Body that just leaves behind a silhouette of the person's body. But the fact that individuals filming such videos could be undressed has led to a
When the headlines focus on breaches of large enterprises like the Optus breach, it’s easy for smaller businesses to think they’re not a target for hackers. Surely, they’re not worth the time or effort? Unfortunately, when it comes to cyber security, size doesn’t matter. Assuming you’re not a target leads to lax security practices in many SMBs who lack the knowledge or expertise to put simple
Acer has released a firmware update to address a security vulnerability that could be potentially weaponized to turn off UEFI Secure Boot on affected machines. Tracked as CVE-2022-4020, the high-severity vulnerability affects five different models that consist of Aspire A315-22, A115-21, and A315-22G, and Extensa EX215-21 and EX215-21G. The PC maker described the vulnerability as
The end of year holidays mark the busiest time of the year for online shoppers. We’re all rushing around trying to find the right gift that doesn’t break the budget. Throw in family time and stress can get out of hand. Sadly, this time also marks one of the busiest times of year for online hackers. With the show more ...
flurry of activity online, they know they’ve got ample targets. Of course, not all targets are equal. Hackers would rather make a quick buck than spend their time forcing their way through in-depth security. That’s why it’s so important to follow the 5 most important rules for online shopping. 1. Strengthen your passwords There’s no reason to still use the same password you came up with in high school. It’s a dirty truth that big businesses suffer data breaches – that means the longer you use a password the more likely it’s been hacked. Even if you’re not using that old website, hackers might know your information and will try logging in to common sites using your old email + password combination. We know it can be a pain to keep track of everything, and that’s why we recommend using a password manager service. 2. Visit reputable sites We all want to score the best deals on holiday shopping, but the old adage is true – if it seems too good to be true, it probably is. You don’t need to go to sketchy sites to find the best prices. The biggest retailers have deals all season long. Plus, when you use a big site you don’t run the risk of getting a knockoff product. 3. Protect your WiFi So much of our life is on the go, and holiday shopping is no different. Did you know that WiFi networks are often targeted by hackers and scammers? Even the one in your home can be spoofed, allowing thieves to steal your information. That’s even more true when you’re connected at the local coffee shop. With a VPN (Virtual Private Network – something all the best antivirus options offer), your information is secure no matter where you connect. 4. Invest in antivirus You get what you pay for doesn’t just apply to your shopping. If you really want to make sure you’re safe online during the holidays, you want to make sure to invest in a reputable antivirus. No one wants a knock-off gifts – they’re low quality and unreliable. So why would you settle for a knock-off antivirus? Look for an option that has lots of good reviews, or even better go to a big box store and ask their experts for recommendations. 5. It pays to be suspicious A healthy amount of suspicion can go a long way in protecting yourself while you’re shopping online (and let’s not get started on the sketchy ads we all get on social media). It’s always important to trust your gut. It’s also important to be wary of free money, unexpected calls from financial institutions and sites asking for personal information (rather than just billing info). And let’s not get started on the sketchy ads we all get on social media. Holiday shopping can be stressful enough, don’t let it get worse with a stolen credit card or hacked computer. Follow the 5 most important rules for staying safe online and you can shop worry free and get back to celebrating. Interested in learning about award-winning antivirus? Discover Webroot. The post The 5 most important rules for online shopping appeared first on Webroot Blog.