Friday, 21. April 2017This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Fake Super Mario Run App Steals Credit Card Information
Trend Micro has identified more malicious Android apps abusing the name of the popular mobile game Super Mario Run. We earlier reported about how fake apps were using the app’s popularity to spread; attackers have now released versions of these fake apps that steal the user’s credit card information.
New RawPOS Behavior Risks Identity Theft
Despite being one of the oldest Point-of-Sale (PoS) RAM scraper malware families out in the wild, RawPOS (detected by Trend Micro as TSPY_RAWPOS) is still very active today, with the threat actors behind it primarily focusing on the lucrative multibillion-dollar hospitality industry.
Cyberattack Hits 1,200 InterContinental Hotels in United States
Global hotel chain InterContinental Hotels Group Plc said 1,200 of its franchised hotels in the United States, including Holiday Inn and Crowne Plaza, were victims of a three-month cyberattack that sought to steal customer payment card data.
Shadow Brokers Leaks Hacking Tools
Several hacking tools and exploits targeting systems and servers running Microsoft Windows were leaked by hacking group Shadow Brokers. Several of these were reportedly tools targeting financial organizations worldwide.
There Is a Possible New Member in the Winnti Group
Through this entry, in which we take a closer look at an individual who we believe might be connected to the Winnti group, we hope to give both ordinary users and organizations better insights into some of the tools these kinds of threat actors use, as well as the scale in which they operate.
‘BrickerBot’ Malware Destroys Unsecured Internet-Connected Devices
A new kind of attack is targeting unsecured Internet of Things devices by scrambling their code and rendering them useless. Reminiscent of the Mirai botnet that brought down large swathes of the US internet last year, this new malware targets poorly secured Internet of Things devices.
Online Threats Are Emerging Faster Than Ever
Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicious programs are becoming more sophisticated, and in turn, they’re harder to detect and mitigate quickly.
Mobile Devices Still Threaten Your Business
Mobile devices have been commonly used in corporate environments for decades – bulky portable telephones, heavy laptops and PDAs. Then along came Apple and the smartphone, and soon everyone either had a personal smartphone or expected their employers to provide one.
Hong Kong Is Tightening Cybersecurity After Broker Hacks
Hong Kong plans to toughen information security rules after a series of embarrassing hacks at the city’s brokers, the securities regulator said on Thursday. The draft rules would likely include requirements for two-step authentication for account log-in.
Hybrid Cloud Is The New Normal
Recently “Hybrid Cloud” has bubbled up more and more. The good news here is that the term is an accurate and useful way to describe the reality that most organizations are facing…and will continue to face for the foreseeable future.
Set Sail with Docker
Docker’s popularity has been explosive, with thousands of organizations using its platform to modernize applications, build microservices, optimize infrastructure and embrace a true DevOps practice. Like any transformation, moving to Docker is a journey for an organization.
The New Frontier in Cybersecurity Is Underwater
Worldwide, demand for UUV units is expected to grow by 49 percent from 2016 to 2020. The laws of physics still constrain communications: high-speed wireless “underwater internet” of the type that is now pervasive in the world’s cities is still just theory, but the technology is developing very fast.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.