Activities from Emotet malware more than tripled in the past year in Singapore: Ensign InfoSecurity

Activities from Emotet malware more than tripled in the past year in Singapore: Ensign InfoSecurity

Posted by , 18-09-2019

SINGAPORE - A variant of a global malicious software, or malware, called Emotet tripled its activity level in Singapore in the last year and is posing a greater threat to local businesses and net...

Startling investigation finds that simple flashlight apps on Android request up to 77 permissions

Startling investigation finds that simple flashlight apps on Android request up to 77 permissions

Posted by , 16-09-2019

Even though a flashlight capability is now native to the latest smartphones, if you search long enough you can still find hundreds of flashlight apps on the Google Play Store. Apps like Ultra Col...

China

China 'blamed for cyber-attack' on Australian parliament

Posted by , 16-09-2019

Australian intelligence determined China was responsible for a cyber-attack on its national parliament and three largest political parties before the general election in May, according to a report b...

Ryuk: All you need to know about the highly-targeted ransomware campaigns

Ryuk: All you need to know about the highly-targeted ransomware campaigns

Posted by , 16-09-2019

Ryuk ransomware targets large organizations and decides demands based on the victim organization’s value. Operated by the sophisticated eCrime group Grim Spider, this malware has the capabili...

LinkedIn can’t block public profile data scraping, court rules

LinkedIn can’t block public profile data scraping, court rules

Posted by , 13-09-2019

An appeals court has told LinkedIn to back off – no more interfering with a third-party data-analytics startup’s use of the publicly available data of LinkedIn’s users. The court&rs...

Critical Exim flaw opens servers to remote code execution, patch now!

Critical Exim flaw opens servers to remote code execution, patch now!

Posted by , 13-09-2019

The Exim mail transfer agent (MTA) is impacted by a critical vulnerability that may allow local or unauthenticated remote attackers to execute programs with root privileges on the underlying system. ...