article thumbnail

How to use your Android as a 2FA key

The Parallax

Google Play is an ‘order of magnitude’ better at blocking malware. As long as the Android 2FA phones are free of malware, they might even be more secure than separate two-factor authentication keys, such as YubiKeys , says Aaron Cockerill, chief strategy officer at Lookout Mobile Security. READ MORE ON ANDROID SECURITY AND PRIVACY.

How To 174
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

Attackers could exploit Shellshock to gain full control of vulnerable systems, leading to data breaches, service interruptions and malware deployment. It became one of 2018’s most exploited vulnerabilities and continues to be utilized by various threat actors including SideWinder. The impact extended far beyond local systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2018-0798.

Malware 79
article thumbnail

How to protect your smart TV from hackers

The Parallax

In the middle of June, Samsung tweeted out advice to owners of its smart TVs: Scan them for malware and viruses. Those risks include smart TV makers themselves, according to a 2018 study by Consumer Reports. IHS Markit predicted that smart TVs would account for 70 percent of all global TV sales in 2018, up from 45 percent in 2015.

How To 37
article thumbnail

Your old router could be a hacking group’s APT pawn

The Parallax

T o create layers of obfuscation that hide an attack’s origins, Grange says, Inception Framework then reroutes its malicious messages at least three times through the hijacked routers before ultimately sending them to their targets, or allowing the hidden malware to communicate with its control server.

Malware 223
article thumbnail

Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices

TechCrunch

Other malicious hackers target IoT devices as a way to get a foot into a victim’s network, allowing them to launch attacks or plant malware from the inside. California paved the way after passing an IoT security law in 2018, with the U.K. Mirai had ensnared thousands of IoT devices into its network at the time of the attack.

IoT 207
article thumbnail

Ransomware attacks against hospitals: A timeline

The Parallax

While there’s no ransomware-specific cost estimate to the health care business, Verizon’s annual Data Breach Report for 2018 estimates that ransomware is included in 85 percent of the successful malware attacks against hospitals. Cybersecurity researchers at Cylance estimated that the number of ransomware attacks tripled in 2017.

Security 154