Magecart Attacks and Is Your Smart TV Spying on You?
Learn about Magecart attacks and the security implications of PSD2. Also, read about how your smart TV might be leaking your data to the likes of Facebook, Google and Netflix.
Save to Folio
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Magecart attacks and the security implications of PSD2. Also, read about how your smart TV might be leaking your data to the likes of Facebook, Google and Netflix.
In the 21st century data breaches are inventible. According to a new report, there have been nearly 4,000 data breaches in the first six months of 2019, representing a 54% increase compared to the first six months of 2018. In Trend Micro’s blog, learn about the recent CafePress and StockX breaches and what you can do to keep your data safe.
If you’ve recently booked a hotel online using your mobile device, you might want to check on your credit card. Trend Micro discovered a series of incidents where credit card skimming attack, Magecart, was used to hit the mobile booking website of several chain-brand hotels.
The European Union’s Revised Payment Service Directive (PSD2), otherwise known as Open Banking, is designed to make banking transactions more cost-efficient and secure but requires customer to give consent for banks to share their data with fintech companies. Trend Micro’s latest research paper explores the ins and outs of possible security risks that may emerge as a result of PSD2.
Cryptocurrency-mining threats have become increasingly complex and the Linux malware that Trend Micro recently discovered is no exception. Skidmap loads malicious kernel modules to keep its cryptocurrency mining operations under the radar.
Cyberattacks are now considered by most execs to be the top business concern, far outranking economic uncertainty, brand image, and regulation. In a global survey of more than 1,500 business leaders, Microsoft and insurance consultancy Marsh found that 62% of respondents saw cyberattacks as a top-five risk.
The threat actors operating the Emotet malware broke a nearly four-month hiatus by launching a spate of malicious spam emails targeting German-, Italian-, Polish-, and English-speaking users. This wave of Emotet-related spam emails and its related malicious components are proactively blocked by Trend Micro’s machine learning detection capabilities.
What attack opportunities lie in radio frequency (RF) technology? As a growing number of IoT and IIoT ecosystems are based on RF communication, Trend Micro believes that RF security research is of great importance. In this blog post, The Trend Micro team showcases the vulnerabilities of LED Wristbands
Trend Micro observed a fileless cryptocurrency-mining malware, dubbed GhostMiner, that weaponizes Windows management instrumentation (WMI) objects for its fileless persistence, payload mechanisms, and AV-evasion capabilities. The malware was observed mining Monero cryptocurrency, however, the arrival details of this variant has not been identified.
Verizon recently released a five-step process for evaluating cloud security products and services to inform purchase decisions. Read how Trend Micro can help provide visibility across physical, virtual, cloud and container environments
A report released today by Trend Micro has found that new European Open Banking rules could leave financial services organizations and their customers more susceptible to cyber-attacks.
University researchers say that smart TVs are leaking sensitive, private user information to companies including Google, Facebook, and Netflix without the consent of users, even while the device is idle.
Personal data about almost every Ecuadorean citizen has been found exposed online. Names, financial information and civil data about 17 million people, including 6.7 million children, was found by security company vpnMentor.
The details of more than 24.3 million Lumin PDF users have been shared on a hacking forum, ZDNet has learned from a source. The hacker said they leaked the company's data after Lumin PDF administrators failed to answer his queries multiple times over the past few months.
We are moving towards an era where cybercriminals can reach their targets in any part of the world at any time; the need for cybersecurity has never been more critical than now.
Were you surprised by the number of data breaches in the first half of 2019? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.