Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer. The new strain has been dubbed "QNPCrypt" by Intezer and eCh0raix" by Anomail and is written in the Go programming language.
New Ransomware Targets Network Attached Storage Devices
New Phishing Scam Targets Your Amazon Account
McAfee researchers have discovered a new version of the 16Shop phishing kit in use by hackers around the world. According to the latest research, there are now more than 200 URLs currently being used by hackers to collect login information from Amazon customers.
New Spyware Is Targeting WhatsApp Messages
Recently, Kaspersky Labs has identified a new strain of malware to be concerned about, and it is spreading across the internet.
Called FinSpy, it specifically targets WhatsApp on both Android and iOS devices. An analysis of the code reveals that the spyware was created by a German company called Gamma Group, and that it is primarily used by state actors.
Google Home Device Recordings May Not Be Private
Do you own a Google Home? If so, you probably find it to be indispensable. It's a powerful, genuinely helpful piece of technology, but there's a catch. It's so good and so useful because it listens constantly for voice commands from you. Those commands get recorded.
Apple Turns Off Mac OS Feature For Security Concerns
Apple is in the news again, but not for anything good.
Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer's webcam without alerting the computer's owner.
The problem is a program called Zoom.
Android Devices May Soon Get New Fast Sharing Feature
Google's first attempt at making it possible for Android users to share files with each other was called Android Beam.
While it was functional, it left a lot to be desired, and never really caught on. That fact prompted the company to announce that it would be calling a halt to further Beam development in preference for a new tool.
Android Malware Can Replace Real Apps With Fake Apps
Security researchers at Check Point have discovered a disturbing new strain of Android malware that's as ingenious as it is disturbing. It is effective because it is designed to replace a rapidly expanding number of apps with poisoned copies.
The app copies still retain their core functionality, making the malware notoriously difficult to detect.
Unsecured Database May Have Exposed Some Big Companies
An UpGuard research team recently discovered several unsecured Amazon S3 buckets belonging to the Israeli IT Services firm Attunity.
The company left the buckets unsecured, exposing more than a terabyte of sensitive information belong to a number of prominent companies including Ford, TD Bank and Netflix.
SmartHome Device Vendor Data Leak Includes User Information
Orvibo is a Chinese manufacturer of smart home solutions. These are devices that allow owners to manage connected smart appliances in their home, remotely control lighting, security, HVAC and home entertainment devices, as well as monitor energy usage.
Protecting Utilities From Cyber Threats Is One Step Closer
The US government took another important step toward protecting the nation's vulnerable electrical infrastructure with the passage of the SEIA bill in the Senate. The bill would mandate the use of analog or manual technologies on US power grids as a fallback in the event of a cyber-attack against the grid.