12 Feb 2019

Experian: US Suffers the Most Online Fraud

According to new research by Experian, US consumers and companies are prime targets for online fraud campaigns. Losses related to online fraud have increased over the past year for eight out of ten US firms, while this is true for only a little over half (55%) of businesses in Europe and

Read More
12 Feb 2019

Coalition of State Attorney Generals Urge FTC to Update Identity Theft Rules

In a joint letter(PDF) to the Federal Trade Commission (FTC), 31 US state attorneys general are urging the FTC to “update its current Identity Theft Rules to help banks and creditors keep up with new and ever-changing technology to stop identity thieves in their tracks.” The coalition of state attorneys general believe that

Read More
12 Feb 2019

US government warns allies about Huawei again

The US government has once again warned some of its allies in Europe not to use Huawei technology. During a visit to Hungary, Secretary of State Mike Pompeo said that his governments wants to point out the risks of using Huawei equipment, and stated that if governments collocate Huawei equipment near key American

Read More
11 Feb 2019

China’s cybersecurity law update lets state agencies ‘pen-test’ local companies

Recorded Future experts are worried about recent changes to China’s Cybersecurity Law, as these enable government agencies to carry out penetration tests on internet-related companies in China and to copy data discovered during the investigations. Security experts believe that the legal provisions mainly aim to give the Chinese government access to data

Read More
11 Feb 2019

US Law Enforcement Busts Romanian Online Crime Operation

In an international law enforcement operation, the US and various other countries have cooperatively taken down a mostly Romanian cyber crime group that has made millions from US citizens through various online scams in which they advertised non-existent products on platforms like including eBay, Craigslist, and Amazon. The criminals created seller

Read More
11 Feb 2019

Android WARNING: Fake version of popular app STEALS sensitive data from your Google phone

Security researchers with Bitdefender have found the powerful Triout spyware in a fake version of a popular Android app that has been downloaded over 50 million times from the Google Play Store. The malicious version of the app is distributed through third-party app platforms. The researchers expect that Triout will be bundled in more

Read More
11 Feb 2019

US Senators ask DHS to look into US government workers using foreign VPNs

Senator Ron Wyden (D-OR) and Marco Rubio (R-FL) have asked the Department of Homeland Security (DHS) to investigate the potential risks of the use of foreign software for data redirection, such as VPN applications and data proxies, by US government personnel. They are worried that software providers based in countries

Read More
11 Feb 2019

Refrigeration Systems Used by Supermarkets, Hospitals Left Exposed Online

In a new study that once again confirms the major security issues with Internet of Things (IoT) devices, researchers with Safety Detective have found that threat actors can easily access and remotely control thousands of Internet-connected commercial refrigeration systems. The researchers discovered that remote access to 7,400 refrigeration systems by Scottish

Read More
11 Feb 2019

First clipper malware discovered on Google Play

Researchers with ESET have found a malicious app designed to steal cryptocurrency in the Google Play Store. The app, which mimicked MetaMask, a legitimate service for running Ethereum-supported applications in a browser, has been removed from the Play Store after the researchers alerted Google. The app ran a form of

Read More
10 Feb 2019

DHS warns of cyberattacks on third-party companies by China

The Department of Homeland Security is warning that large companies will be targeted through their supply chain and third party vendors. As major companies improve their cyber defenses, Chinese attackers will target the weaker links represented by vendors either to obtain access to proprietary information or use the vendor as

Read More