A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.
from Dark Reading: https://ubm.io/2Hxlpxy
via IFTTT
A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.
from Dark Reading: https://ubm.io/2Hxlpxy
via IFTTT
The new exploit builds a fake frame around legitimate portions of an online commerce website.
from Dark Reading: https://ubm.io/2HNXJ6X
via IFTTT

By BRIAN X. CHEN and CADE METZ
In a free service, bots call restaurants and make reservations. The technology is impressive, except for when the caller is actually a person.
Published: May 21, 2019 at 07:00PM
from NYT Technology https://nyti.ms/2JCj6LU
via IFTTT

By KAREN WEISE
The resolutions, voted on by shareholders, would have pushed the company to reconsider its societal impact.
Published: May 21, 2019 at 07:00PM
from NYT Technology https://nyti.ms/2Hw8V9t
via IFTTT
[Episodes Removed] Food lovers Jamie Oliver and Jimmy Doherty open a café at the end of a pier in Essex to share their passion with the locals — and celebrity guests.
from New On Netflix USA http://bit.ly/2EscJ9J
via IFTTT
At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company.
from Dark Reading: https://ubm.io/2HMEpaf
via IFTTT

Telepathy Is Real With The Help Of A Computer
Our computers can read and record brain activity. So what happens when a brain and a computer team up to connect to another brain-computer combo?
May 22, 2019 at 03:54PM
via Digg http://bit.ly/2HyOd96
A estas alturas no debería sorprender a nadie: sí, Google guarda un historial con todos los lugares que has visitado a través de Google Maps, y aunque a muchos les parece toda una amenaza contra su privacidad, lo cierto es que en algunos casos puede llegar a ser una característica verdaderamente útil. No obstante, Google sabe que no todo el mundo está dispuesto a permitir que los puntos del mapa
Entra en Andro4all para leer el artículo completo
Puedes unirte a nosotros en Twitter, Facebook o en Google+
¡Suscríbete a nuestro canal de YouTube!
Publicado recientemente en Andro4all
from Andro4all http://bit.ly/2K30Jzj
via IFTTT
[New Episodes] A forensics expert who wakes from a coma with amazing new powers squares off against forces threatening the city in this live-action superhero romp.
from New On Netflix USA http://bit.ly/2qGBsO5
via IFTTT
Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days — or else. Here’s a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware.

On or around May 12, at least two antivirus firms began detecting booby-trapped Microsoft Word files that were sent along with some various of the following message:
{Pullman & Assoc. | Wiseman & Assoc.| Steinburg & Assoc. | Swartz & Assoc. | Quartermain & Assoc.}
Hi,
The following {e-mail | mail} is to advise you that you are being charged by the city.
Our {legal team | legal council | legal departement} has prepared a document explaining the {litigation | legal dispute | legal contset}.
Please download and read the attached encrypted document carefully.
You have 7 days to reply to this e-mail or we will be forced to step forward with this action.
Note: The password for the document is 123456
The template above was part of a phishing kit being traded on the underground, and the user of this kit decides which of the options in brackets actually get used in the phishing message.
Yes, the spelling/grammar is poor and awkward (e.g., the salutation), but so is the overall antivirus detection rate of the attached malicious Word document. This phishing kit included five booby-trapped Microsoft Word documents to choose from, and none of those files are detected as malicious by more than three of the five dozen or so antivirus products that scanned the Word docs on May 22 — 10 days after they were spammed out.
According to both Fortinet and Sophos, the attached Word documents include a trojan that is typically used to drop additional malware on the victim’s computer. Previous detections of this trojan have been associated with ransomware, but the attackers in this case can use the trojan to install malware of their choice.
Also part of the phishing kit was a text document containing some 100,000 business email addresses — most of them ending in Canadian (.ca) domains — although there were also some targets at companies in the northeastern United States. If only a tiny fraction of the recipients of this scam were unwary enough to open the attachment, it would still be a nice payday for the phishers.
The law firm domain spoofed in this scam — wpslaw.com — now redirects to the Web site for RWC LLC, a legitimate firm based in Connecticut. A woman who answered the phone at RWC said someone had recently called to complain about a phishing scam, but beyond that the firm didn’t have any knowledge of the matter.
As phishing kits go, this one is pretty basic and not terribly customized or convincing. But I could see a kit that tried only slightly harder to get the grammar right and more formally address the recipient doing quite well: Legitimate-looking legal threats have a way of making some people act before they think.
Don’t be like those people. Never open attachments in emails you were not expecting. When in doubt, toss it out. If you’re worried it may be legitimate, research the purported sender(s) and reach out to them over the phone if need be. And resist the urge to respond to these spammers; doing so may only serve to encourage further “mailious” correspondence.
KrebsOnSecurity would like to thank Hold Security for a heads up on this phishing kit.
from Krebs on Security http://bit.ly/2YILRdu
via IFTTT