Google Docs phishing attack is fixed

Share this

Google Docs users were hit by a widespread phishing attempt everywhere being spammed with what appeared to be malicious invitations to log on to their Google accounts. Unlike your garden-variety cyberattack, many of the telltale signs that could tip off that something was awry are absent. What made this attack so tricky to detect was that it took advantage of Google’s legitimate tool for sharing data with responsible third-party apps. Since the bogus invitation was being routed through Google’s real system, nothing was misspelled, the icons looked accurate, and it’s hard to know something’s…

Share this
Read More

Phishing attacks using internationalized domains are hard to block

Share this

Attackers can evade a security mechanism and abuse Unicode domains to phish for the login credentials of Chrome, Firefox, and Opera users. Security researcher Xudong Zheng has developed a proof-of-concept that exploits an issue in some web browsers. Attackers can abuse this sleight of hand to redirect users to phishing websites. All they need to do is use Punycode, which relies on ASCII characters to convey foreign characters.  The Punycode domain “xn--pple-43d.com” is equivalent to “apple.com”, for example. As long as a web browser translates the Punycode into what’s known…

Share this
Read More

BankBot trojan hits Google Play

Share this

A trojan virus that affects Android devices leaked online in January. This was the BankBot, a banking malware which disguised itself as a harmless program and able to avoid Google’s security scans. Weeks after the attack, the malware found its way to Google Play Store. What makes this vicious banking Trojan threatening is that it was able to find a way of hiding in apps using a variety of names on Play Store. On is Funny Videos 2017 and the other is the HappyTimes Videos, with the latter discovered just…

Share this
Read More

Artificial intelligence could be the key to cyber security

Share this

In a constantly evolving digital threat landscape, where firewalls and antiviruses are considered tools of antiquity, companies are looking to more technologically advanced means of protecting crucial data. Experts point out the cyber-threat landscape has drastically changed and that criminals are now using more artificial intelligence technologies to launch sophisticated attacks. Even a few years ago, launching a distributed denial of service attack to take down a website, defacing webpages and stealing credit card details were considered major instances of cyber-attacks. Today, anything from medical records to airline miles data…

Share this
Read More

IT Security remains a Top Concern for Tech Startups

Share this

The increase in the amount of data breaches and cyber attacks have resulted in a rise in the number of conversations surrounding IT security for small businesses. While the resulting conversation is an important one, all too often small businesses simply don’t have the time to research and understand the onslaught of technological solutions that are available to them. This widespread lack of education is growing as cybersecurity solutions continue to be developed and released at unprecedented levels. With these challenges in mind, the increase in IT security conversations has…

Share this
Read More

Microsoft finalizes its custom version of Windows 10 for China

Share this

Microsoft’s supremo for China has told state-owned China Daily that Redmond’s ready roll out version of Windows 10 with extra security features demanded by China’s government. “We have already developed the first version of the Windows 10 government secure system. Alain Crozier, CEO of Microsoft Greater China noted that it has been tested by three large enterprise customers. China’s government previously banned Windows 8, citing security concerns, and launched an anti-monopoly probe against Microsoft. They as well cited claims that there may be hidden back doors in the operating system. The…

Share this
Read More

Cyber crime is fastest growing economic crime

Share this

Cyber crime is perceived as the fastest growing fraud risk (40%), followed by bribery and corruption (36%)around the globe. The UK has seen a double-digit rise in economic crime against corporates in the past two years, with 55% of organisations affected up 11% since 2014 and well above the US (38%) and China (28%). Globally, the economic crime rate has remained largely static at 36%, according to the survey of more than 6,000 respondents in 115 countries. The survey found that 60 % of economic crime in the UK was…

Share this
Read More

Google kills off the Captcha Feature

Share this

The online tests to check whether you’re a human or a robot  have been a necessary evil, but Google is finally killing them off in their current form. For some time now, Captcha has served as the primary way of telling humans and robots apart on the internet. It made sure that the person looking to access a website was actually a human being – ensuring that robots couldn’t be used to send spam or flood a website with requests. However, the technologies have become more complex and robots have…

Share this
Read More

Security of IoT Devices to Be Rated for First Time

Share this

IoT standards groups are emerging to address issues of inter operability, communication protocols and security. Consumer Reports will begin considering the cybersecurity and privacy safeguards of products when rating them – a long overdue move perhaps, given Internet of Things device manufacturers have previously been accused of doing the barest minimum to protect consumers. The firm will steadily implement the methodologies across its reviews, starting with test projects evaluating a small number of products. The move follows a surge in cyberattacks which have exploited vulnerabilities in Internet of Things devices such as webcams, routers, digital video…

Share this
Read More

Security Concerns Rising in the Age of IoT

Share this

IoT has gone mainstream. Home refrigerators are chattier than ever, and emerging virtual home assistants can order wings for dinner, turn on lawn sprinklers, start the car and purchase pounds of cookies. Yet behind the headlines of these gee-whiz cyber technologies lurks a shortcoming. It is one that poses significant threats to national security but could be remedied fairly easily, some experts offer. The mobile device and sensor industries lack uniform security standards and a system of checks and balances—something akin to the safety standards for electrical devices and components…

Share this
Read More