article thumbnail

Free Smartwatches Are Vector to Hit Military Personnel with Malware

SecureWorld News

Army's Criminal Investigation Division (CID) is urging military personnel to be on the lookout for unsolicited, suspicious smartwatches in the mail, warning that the devices could be rigged with malware. You're compromising your personal and/or professional data with malware." Worst case?

Malware 79
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

A new study from Uptycs has uncovered an increase in the distribution of information stealing malware. Newly discovered stealer families include modules that specifically steal logs from MFA applications, like the Rhadamanthys malware. This demonstrates a focus on collecting data from multi-factor authentication tools.

Malware 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Two security flaws in the TPM 2.0 specs put cryptographic keys at risk

TechSpot

Security researchers recently discovered a couple of flaws in the Trusted Platform Module (TPM) 2.0 Exploiting the flaws is only possible from an authenticated local account, but a piece of malware running on an affected.

article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO Business Intelligence

Weak authentication and authorization: One of the foremost vulnerabilities in IoT deployments stems from inadequate authentication and authorization practices. In fact, two notorious botnets, Mirai and Gafgyt, are major contributors to a recent surge in IoT malware attacks. of the total number of attempted IoT malware attacks.

article thumbnail

Research Uncovers 3,200+ Mobile Apps Leaking Twitter API Keys

SecureWorld News

New research from security firm CloudSEK shows that more than 3,200 mobile applications were leaking Twitter API (Application Program Interface) keys, which can be used to gain access and take over user accounts. Researchers learned that 3,207 apps were leaking valid Consumer Key and Consumer Secret information.

article thumbnail

Ask.com serves as a conduit for malware - again

Network World

In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates. To read this article in full or to leave a comment, please click here

Malware 112
article thumbnail

New Alert: Russian Hackers Are Targeting COVID-19 Research

SecureWorld News

CISA advisory: who is targeting COVID-19 research? Cyberattacks on COVID-19 research are starting to feel as common as COVID-19. In fact, CISA has already published a general joint advisory on nation-state hackers targeting pandemic research. This file has been identified as a variant of the malware family known as WellMail.