Cyber News Rundown: WhatsApp Vulnerability Could Install Spyware

Reading Time: ~2 min.WhatsApp Exploited to Install Spyware through Calls A serious flaw has been discovered in the messaging app WhatsApp that would allow an attacker to install spyware on a victim’s device by manipulating the packets being sent during the call. Further disguising the attack, the malicious software could be installed without the victim answering the call, […]
The post Cyber News Rundown: WhatsApp Vulnerability Could Install Spyware appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/05/17/cyber-news-rundown-whatsapp-vulnerability-could-install-spyware

Cyber News Rundown: Dharma Diversion

Reading Time: ~2 min.Dharma Ransomware Employs Diversion Tactics Researchers recently discovered a new ransomware variant that displays an ESET AV removal screen once launched in order to divert the a victim’s attention from the silent encryption taking place. Initially dropped by an email spam campaign, the payload comes as a password protected zip archive, with the password made […]
The post Cyber News Rundown: Dharma Diversion appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/05/10/cyber-news-rundown-dharma-diversion

Cyber News Rundown: Hackers Target Citrix Networks

Reading Time: ~2 min.Hackers Gain Access to Citrix Networks for Six Months Citrix recently announced that hackers had gained access to their internal networks for nearly half a year. During the breach, the hackers were able to gather an unknown number of documents containing both employee and customer data, including social security numbers and other personally identifiable information. […]
The post Cyber News Rundown: Hackers Target Citrix Networks appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/05/03/cyber-news-rundown-hackers-target-citrix-networks/

High Value Cryptocurrency Stolen by Hackers

Reading Time: ~2 min.Hackers Breach Private Keys to Steal Cryptocurrency A possible coding error allowed hackers to compromise at least 732 unique, improperly secured private keys used in the Ethereum blockchain. By exploiting a vulnerability, hackers have successfully stolen 38,000 Ethereum coins so far, translating to over $54 million in stolen funds, though the current number is likely […]
The post High Value Cryptocurrency Stolen by Hackers appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/26/high-value-cryptocurrency-stolen-by-hackers/

Notice: What Happens on Public Computers, Stays on Public Computers

Reading Time: ~4 min.These are the places your digital tracks can be dug up. With a little sleuthing. Experts have warned for years of the risks of using public computers such as those found in libraries, hotels, and airline lounges.  Many warnings focused on the potential for hackers to plant keystroke loggers, or intercept data as it flows […]
The post Notice: What Happens on Public Computers, Stays on Public Computers appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/24/notice-what-happens-on-public-computers-stays-on-public-computers/

Cyber News Rundown: Phishing Attack on Global IT Outsourcer

Reading Time: ~2 min.Major IT Outsourcer Suffers After Phishing Attack Global IT services provider Wipro announced they are in the process of investigating a data possibly affecting some of their clients. These types of companies are popular for hackers because, by breaching a single IT service company, they gain access to a far larger pool of victims through […]
The post Cyber News Rundown: Phishing Attack on Global IT Outsourcer appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/19/cyber-news-rundown-phishing-attack-on-global-it-outsourcer/

Cyber News Rundown: Tax Extortion Ransomware Scams Corporations

Reading Time: ~2 min.Tax Extortion Emails Bring Major Threats A new email campaign has been spotted threatening ransomware and DDoS attacks over fake tax documents allegedly held by the attackers if a Bitcoin ransom isn’t paid. The campaign authors also threaten to send fake tax documents to the IRS through a poorly-worded ransom email that even provides Wikipedia […]
The post Cyber News Rundown: Tax Extortion Ransomware Scams Corporations appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/12/cyber-news-rundown-tax-extortion-ransomware-scams-corporations/

Cyber News Rundown: Massive Data Breach at Georgia Tech

Reading Time: ~2 min.Massive Data Breach at Georgia Tech It was recently revealed that the personal information on over 1.3 million people was illicitly accessed by hackers who breached Georgia Tech systems in December of last year. The breach is the second of the year for the university, and was only discovered after IT staff noted performance issues […]
The post Cyber News Rundown: Massive Data Breach at Georgia Tech appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/05/cyber-news-rundown-massive-data-breach-at-georgia-tech/

Hijacked Email Reply Chains

Reading Time: ~4 min.Although phishing has been around in various forms since the 1980s, our research shows it continues to evolve—and remains a major threat. These days, phishing tactics have gotten so sophisticated, it can be difficult to spot a scam—particularly in the case of hijacked email reply chains. Let’s look at a concrete example. Imagine you’re a purchaser […]
The post Hijacked Email Reply Chains appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/04/03/hijacked-email-reply-chains/

Cyber News Rundown: Hacker Exposes 26 Million Personal Records

Reading Time: ~2 min.Gnosticplayers Adds 26 Million More Records for Sale After the first 3 major data dumps, which totaled over 600 million records, the hacker known as Gnosticplayers has released his latest cache of data, which contains at least 26 million personal user records. These data caches hold customer information for 32 companies overall and have been […]
The post Cyber News Rundown: Hacker Exposes 26 Million Personal Records appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2019/03/22/cyber-news-rundown-hacker-exposes-26-million-personal-records/