-
04 Jan 201917:42
Proofpoint observes novel technique that uses custom web fonts to help phishing pages evade detection Cybersecurity researchers at Proofpoint have discovered a new phishing technique that allows cybercriminals to hide phishing pages via custom web font files. The researchers found the new technique after observing strange encoding in a credential harvesting scheme impersonating a major retail... Read More
The post Researchers discover new custom web font phishing attack appeared first on Techerati.
-
29 Dec 201813:45
December 2018 McAfee Labs threat report shows sharp increase in malware targeting IoT devices, which can then be used for cryptomining exploits IoT malware threats have increased from just over 5,000 in Q4 2016 to over 45,000 incidents detected in Q3 2018. IoT threats may target any kind of connected hardware including routers, smart devices,... Read More
The post IoT cryptomining exploits on the rise appeared first on Techerati.
-
20 Dec 201812:14
Hackers break into Gmail and Yahoo accounts of journalists and activists “at scale”, even those with two-factor authentication (2FA) enabled Multiple credentials phishing campaigns targeting human rights activists and journalists across the Middle East and North Africa have been disclosed by Amnesty International. Credentials phishing deploys imitations of websites, wherein a login prompt lures a... Read More
The post Hackers bypass two-factor authentication “at scale” appeared first on Techerati.
-
17 Dec 201815:17
Security controls and processes for ballistic missile defense system (BMDS) not consistently implemented leaving technical information exposed, according to a security audit released by the US Department of Defense Inspector General (DOD IG) A US DOD cybersecurity audit of US missile defence systems has revealed officials are failing to implement basic cybersecurity controls such as... Read More
The post US missile defence systems fail cybersecurity audit appeared first on Techerati.
-
10 Dec 201814:42
New research from RedSeal reveals UK industry needs greater support from the government against mounting cyber threats Fears over the UK’s withdrawal from the European Union might have dominated the business press in 2018, but new research from security vendor RedSeal has outlined the equally real, present (and arguably larger), danger posed by cyberattackers to... Read More
The post 68% of UK businesses hit by a cyberattack this year appeared first on Techerati.
-
06 Dec 201810:10
Company no longer using Huawei equipment in existing 3G and 4G networks, removing hardware from “core” of 5G service BT has confirmed reports in the Financial Times that it is stripping Huawei equipment from existing EE 3G and 4G core mobile operations and future 5G core operations. Speaking to The Register, the UK telco dismissed... Read More
The post BT wants Huawei hardware far, far Huawei from critical infrastructure appeared first on Techerati.
Features
-
Proofpoint observes novel technique that uses custom web fonts to help phishing pages evade detection Cybersecurity researchers at Proofpoint have discovered a new phishing technique that allows cybercriminals to hide phishing pages via custom web font files. The researchers found the new technique after observing strange encoding in a credential harvesting scheme impersonating a major retail... Read More
The post Researchers discover new custom web font phishing attack appeared first on Techerati.
-
December 2018 McAfee Labs threat report shows sharp increase in malware targeting IoT devices, which can then be used for cryptomining exploits IoT malware threats have increased from just over 5,000 in Q4 2016 to over 45,000 incidents detected in Q3 2018. IoT threats may target any kind of connected hardware including routers, smart devices,... Read More
The post IoT cryptomining exploits on the rise appeared first on Techerati.
-
Hackers break into Gmail and Yahoo accounts of journalists and activists “at scale”, even those with two-factor authentication (2FA) enabled Multiple credentials phishing campaigns targeting human rights activists and journalists across the Middle East and North Africa have been disclosed by Amnesty International. Credentials phishing deploys imitations of websites, wherein a login prompt lures a... Read More
The post Hackers bypass two-factor authentication “at scale” appeared first on Techerati.
-
Security controls and processes for ballistic missile defense system (BMDS) not consistently implemented leaving technical information exposed, according to a security audit released by the US Department of Defense Inspector General (DOD IG) A US DOD cybersecurity audit of US missile defence systems has revealed officials are failing to implement basic cybersecurity controls such as... Read More
The post US missile defence systems fail cybersecurity audit appeared first on Techerati.
-
New research from RedSeal reveals UK industry needs greater support from the government against mounting cyber threats Fears over the UK’s withdrawal from the European Union might have dominated the business press in 2018, but new research from security vendor RedSeal has outlined the equally real, present (and arguably larger), danger posed by cyberattackers to... Read More
The post 68% of UK businesses hit by a cyberattack this year appeared first on Techerati.
-
Company no longer using Huawei equipment in existing 3G and 4G networks, removing hardware from “core” of 5G service BT has confirmed reports in the Financial Times that it is stripping Huawei equipment from existing EE 3G and 4G core mobile operations and future 5G core operations. Speaking to The Register, the UK telco dismissed... Read More
The post BT wants Huawei hardware far, far Huawei from critical infrastructure appeared first on Techerati.