Argentina's Mendoza province becomes first to pass law allowing Uber

Uber Technologies Inc [UBER.UL] got the green light on Tuesday to operate in Argentina's Mendoza province when lawmakers there passed the country's first law regulating ride-hailing applications.


from Reuters: Technology News https://ift.tt/2LOHuuu

U.S. government seeks to boost collaboration with industry on hacks

The U.S. Department of Homeland Security on Tuesday said it will bolster collaboration with the private sector to defend the nation against cyber attacks by working more closely with industry to combat emerging threats.


from Reuters: Technology News https://ift.tt/2M7a86X

Akamai profit beats on strength in cloud security business

Akamai Technologies Inc topped Wall Street's estimates for second-quarter profit on Tuesday, helped by an aggressive push into cloud security and a stabilizing media content delivery business.


from Reuters: Technology News https://ift.tt/2NXcoOE

Apple earnings beat expectations as it sells pricier iPhones

Apple Inc on Tuesday posted quarterly results that topped Wall Street targets and forecast revenue in the current quarter above expectations, driven by sales of higher-priced iPhones and revenue from services like the App Store, Apple Music and iCloud.


from Reuters: Technology News https://ift.tt/2LEj8El

Pandora wins more paid subscribers, posts smaller quarterly loss

Pandora Media on Tuesday reported a smaller quarterly loss than Wall Street was expecting as the music streaming service lured more paid subscribers to its platform in a fiercely competitive market.


from Reuters: Technology News https://ift.tt/2Kgk5NH

Pandora reports smaller loss as paid subscriber base grows

Pandora Media Inc on Tuesday reported a smaller second-quarter loss compared with a year earlier, as the music streaming service signed up more paid subscribers.


from Reuters: Technology News https://ift.tt/2OwPmPG

Akamai quarterly revenue rises 9.4 percent

Akamai Technologies Inc reported 9.4 percent rise in second-quarter revenue on Tuesday, driven by stronger demand for both its cyber-security services and the traditional business of speeding up media content delivery on the web.


from Reuters: Technology News https://ift.tt/2ArRgOz

Facebook Uncovers New Fake Accounts Ahead of Midterm Elections

The company removed 32 pages and accounts from Facebook and Instagram for “coordinated inauthentic behavior.”

from Security Latest https://ift.tt/2OB6uEa

The National Risk Management Center Will Combat Critical Infrastructure Hacks

The National Risk Management Center will give critical infrastructure companies much needed-support when under cyberattack.

from Security Latest https://ift.tt/2LOKyGT

Cryptocurrency exchange Coinbase hires chief compliance officer

Cryptocurrency exchange Coinbase has hired finance executive Jeff Horowitz as chief compliance officer, to help it navigate regulations for virtual currency companies, the company said on Tuesday.


from Reuters: Technology News https://ift.tt/2O0U0Vf

SamSam Ransomware Attacks Extorted Nearly $6 Million

Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example. New research revealed that the SamSam ransomware had extorted nearly $6 million from its victims since December 2015, when the cyber gang behind the ransomware started distributing the malware in the wild. Researchers at Sophos have tracked Bitcoin addresses owned by the


from The Hacker News https://ift.tt/2LLH4Fh

The Last-Ditch Legal Fight to Stop 3-D Printed Guns

After five years, US lawmakers and law enforcement are starting to fight back against 3-D printed firearms and "ghost guns."

from Security Latest https://ift.tt/2LDDb5O

Bitcoin drops 5 percent to one-week low, briefly below $7,700

Bitcoin fell 5 percent on Tuesday, briefly going to a one-week low below $7,700 as investors further scaled back their holdings of digital currencies.


from Reuters: Technology News https://ift.tt/2LRQD5i

UPS partners with LA-based startup to develop electric delivery truck

United Parcel Service Inc said it would partner with a Los Angeles-based company to develop an electric medium-duty delivery truck, as the package delivery company expands its fleet of alternative-fuel vehicles.


from Reuters: Technology News https://ift.tt/2NYpQSe

Phishing, Part 1: On the Lookout

Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat still facing all of us today: phishing.

Phishing can be the first stage in a sophisticated information-stealing attack on a large organization. But the same techniques are used by cybercriminals the world over to steal your personal information for ID theft and to spread dangerous malware. With this in mind, Trend Micro has put together a handy two-part guide giving you the lowdown on phishing attacks—what they’re designed to do, what they look like, and how you can avoid getting caught by the hoax.

Why do cybercriminals phish?

Phishing is fundamentally a confidence trick. It’s an attempt by hackers to get their hands on your online log-ins, your financial information, or other sensitive details they can use to impersonate you for monetary gain. They do this by persuading you they’re someone else—typically a familiar organization you work with. They might want to steal your bank log-ins, your Apple ID, even your Uber account credentials. ID theft is particularly dangerous, since it can open up a world of credit or purchases for them. Or they might try to trick you into downloading ransomware, crypto-mining software, banking Trojans, adware or even info-stealing malware, to help them generate profits. Phishing represents a potential cornucopia for them, of ill-gotten gain.

How do they phish?

The bad guys have a wealth of techniques at their disposal, but they mostly boil down to one thing: social engineering. Fundamentally, this is the art of persuasion. As mentioned, it could mean spoofing an email to appear as if it came from your bank, asking you to update your details with them. Or perhaps it’s a ‘security alert’ that appears to have been sent by Apple or Microsoft. Or maybe it’s a required software update from Adobe, typically around Adobe Flash. Or it might even be a too-good-to-miss offer or piece of outrageous gossip to click on social media.

It’s all about getting you to click on that malicious link, open that malware-laden attachment, or submit your log-ins and personal details. Sometimes you’re taken to a separate website to submit those details, also spoofed to appear legitimate. The idea is to first target the user, rather than attack the machine directly. That being the case, if you improve your awareness of the characteristics of phishing, you can minimize the effectiveness of the phishers.

Phishing types

Here a few common generic phishing attacks:

  • Email: This is still the primary channel for phishing. More than 85 percent of the online threats Trend Micro blocked last year were emails such as those containing malicious content. But users must also beware of scammers using IM (instant messaging), or SMS (the short message service) on their mobile phones.
  • Social media: This is an increasingly popular channel for phishing, as users tend to be more trusting of posts and messages sent by their ‘friends’. Phishers know this and can hack your friends accounts to increase their chances of success. Malicious URLs can be found in Facebook Live comments, Twitter DMs and LinkedIn InMail. Fake promotions and competitions are also rife on social media, as are messages designed to trick you into clicking on some ‘unbelievable’ content.
  • Gaming: Attackers may look to send you a message spoofed to appear as if sent from an online gaming provider. They often contain extra inducement to click through or provide details, such as by offering a prize or bonus points. Stolen account details are then sold on the black market.
  • Tech support: These warning emails are spoofed to come from popular online providers like PayPal, Amazon, eBay, Microsoft, etc. They typically claim to have spotted ‘unusual activity’ on your account and want you to provide more details or to click on a link to sort it out. You might even get an unsolicited email or phone call claiming there’s something wrong with your computer and urging you to pay for tech support to resolve the issue. Sometimes these scammers end up installing remote access software and malware on your machine in the process of ‘cleaning it’.

The scammers are getting smarter

The bad news is that the phishers are refining their tactics all the time. Mobile phishing attacks are increasingly popular as users tend to be distracted and therefore more likely to click through in malicious SMS messages. Phishers are also increasingly likely to use popular events in the news to trick you into clicking, as with a major data breach like Yahoo or Uber, which you may have been caught up in.

Another tactic designed to increase the chances of phishing success is to use to spoof the domains of legitimate sites by using internationalized domain name text. Then too, you need to beware of new “angler” attacks, which typically involve the creation of fake social media profiles resembling brands’ support accounts. Criminals will search for users contacting those companies and hijack the conversation with phishing links.

So what can you do to protect yourself from phishing attacks?

Stay tuned for Phishing, Part 2: Staying Safe, where we’ll brief you on ways to stay safe from phishing attacks.

The post Phishing, Part 1: On the Lookout appeared first on .



from Trend Micro Simply Security https://ift.tt/2AnPRsg

Cisco Certification Training Courses | Ultimate 9-Part Bundle

With the migration of governments and enterprises towards controller-based architectures, the role of a core network engineer has become more important than ever. Today, majority of interconnected wide area networks (WANs) and local area networks (LANs) in the world run on Cisco routers and other Cisco networking equipments, and therefore most organizations need network engineers to maintain


from The Hacker News https://ift.tt/2LWq6Bh

Chinese smartphone maker OnePlus to expand retail store presence in India

Chinese smartphone maker OnePlus aims to expand its retail store presence in India, a company executive said on Tuesday, as the firm plans to make the world's No.2 smartphone market its second headquarters by end 2018.


from Reuters: Technology News https://ift.tt/2Ox3ad6

Dixons Carphone says 10 million accounts may have been hit in 2017 cyber attack

Some 10 million Dixons Carphone records containing personal data may have been accessed in a 2017 cyber attack, the British electronics and mobile phone retailer said on Tuesday, boosting an earlier estimate of 1.2 million.


from Reuters: Technology News https://ift.tt/2As8QSD

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...