Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks

Healthcare is the most targeted industry, by ransomware, in the US in October October saw a 71% increase in Ransomware attacks against the healthcare sector in the US Ransomware attacks also increased by 33% in APAC and 36% in EMEA Yesterday, the CISA, FBI, and HHS issued a warning against ransomware attacks on U.S. hospitals,…

The post Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks appeared first on Check Point Software.



from Check Point Software https://ift.tt/2Jisu8B

All the Ways Slack Tracks You—and How to Stop It

From changing privacy settings to putting limits on those infuriating notifications, here’s how to take control of Slack.

from Security Latest https://ift.tt/35Jn1zc

Don’t Let Hackers Throw Your Brand Integrity Down the Drain

By Yaelle Harel and Yair Herling, Technical Product Marketing Social Phishing attacks remain the most successful methods used to execute attacks and steal data. Lookalike domains or emails are often used to mislead users to open emails, click a link, and enter their credentials or any other sensitive data. Hackers count on the trust that…

The post Don’t Let Hackers Throw Your Brand Integrity Down the Drain appeared first on Check Point Software.



from Check Point Software https://ift.tt/34DaH4d

KashmirBlack Botnet Hijacks Thousands of Sites Running On Popular CMS Platforms

An active botnet comprising hundreds of thousands of hijacked systems spread across 30 countries is exploiting "dozens of known vulnerabilities" to target widely-used content management systems (CMS). The "KashmirBlack" campaign, which is believed to have started around November 2019, aims for popular CMS platforms such as WordPress, Joomla!, PrestaShop, Magneto, Drupal, Vbulletin, OsCommerence,

from The Hacker News https://ift.tt/31V0cHL

How to Run Google SERP API Without Constantly Changing Proxy Servers

You've probably run into a major problem when trying to scrape Google search results. Web scraping tools allow you to extract information from a web page. Companies and coders from across the world use them to download Google's SERP data. And they work well – for a little while. After several scrapes, Google's automated security system kicks in. Then it kicks you out. The standard was to bypass

from The Hacker News https://ift.tt/35IMZD1

FBI, DHS Warn Of Possible Major Ransomware Attacks On Healthcare Systems

The US Federal Bureau of Investigation (FBI), Departments of Homeland Security, and Health and Human Services (HHS) issued a joint alert Wednesday warning of an "imminent" increase in ransomware and other cyberattacks against hospitals and healthcare providers. "Malicious cyber actors are targeting the [Healthcare and Public Health] Sector with TrickBot malware, often leading to ransomware

from The Hacker News https://ift.tt/3kQkdq4

Ransomware Activity Targeting the Healthcare and Public Health Sector

Original release date: October 28, 2020

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.  
 
CISA, FBI, and HHS have released AA20-302A Ransomware Activity Targeting the Healthcare and Public Health Sector that details both the threat and practices that healthcare organizations should continuously engage in to help manage the risk posed by ransomware and other cyber threats. The advisory references the joint CISA MS-ISAC Ransomware Guide that provides a ransomware response checklist that can serve as a ransomware-specific addendum to organization cyber incident response plans. 
 
CISA, FBI, and HHS are sharing this information in order to provide a warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats. CISA encourages users and administrators to review CISA’s Ransomware webpage for additional information. 

This product is provided subject to this Notification and this Privacy & Use policy.



from CISA All NCAS Products https://ift.tt/31N4Yab

Ransomware Activity Targeting the Healthcare and Public Health Sector

Original release date: October 28, 2020

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.

This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS). This advisory describes the tactics, techniques, and procedures (TTPs) used by cybercriminals against targets in the Healthcare and Public Health Sector (HPH) to infect systems with Ryuk ransomware for financial gain.

CISA, FBI, and HHS have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers. CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.

Click here for a PDF version of this report.

Key Findings

  • CISA, FBI, and HHS assess malicious cyber actors are targeting the HPH Sector with Trickbot malware, often leading to ransomware attacks, data theft, and the disruption of healthcare services.
  • These issues will be particularly challenging for organizations within the COVID-19 pandemic; therefore, administrators will need to balance this risk when determining their cybersecurity investments.

 

This product is provided subject to this Notification and this Privacy & Use policy.



from CISA All NCAS Products https://ift.tt/3oAI53j

CEOs do Google, Facebook e Twitter se defendem no Senado dos EUA


Atualmente, só uma questão une democratas e republicanos nos Estados Unidos: as críticas sobre como Facebook, Google e Twitter operam nas redes. Em uma audiência parlamentar realizada nesta quarta-feira (28), executivos das três empresas responderam perguntas dos senadores norte-americanos, que expuseram suas visões sobre o poder do Vale do Silício para policiar a internet.Mas essa união entre os principais partidos dos EUA é breve, já que entre si as queixas são diferentes. Democratas dizem que as companhias deveriam patrulhar melhor seus sites e serviços, enquanto republicanos achavam que as empresas deveriam ter um papel mais indireto no controle do discurso político.As audiências fazem parte da revisão das leis federais conhecidas como Seção 230, que evita que sites de mídia social sejam responsabilizados por postagens, fotos e vídeos publicados em suas redes. "Os democratas costumam dizer que não removemos conteúdo suficiente, e os republicanos costumam dizer que removemos muito", afirmou Mark Zuckerberg em seu discurso. "O fato de ambos os lados nos criticarem não significa que estamos entendendo bem, mas significa que há desacordos reais sobre onde deveriam estar os limites do discurso online".Os republicanos acusam Zuckerberg, Sundar Pichai do Google e Jack Dorsey do Twitter de censura deliberada de conteúdos conservadores, incluindo postagens do presidente Donald Trump. "Quem diabos te elegeu?", questionou o senador republicano Ted Cruz a Dorsey em uma das discussões mais acaloradas. "Por que você insiste em se comportar como um comitê democrata, silenciando pontos de vista contrários às suas crenças políticas?", completou Cruz.Os democratas, por outro lado, acusam os republicanos de usar a audiência para aplicar pressão política no setor de Tecnologia, às vésperas das eleições nacionais. O senador Brian Schatz disse que os republicanos apenas convocaram a sessão para "intimidar" os sites de mídia social para que deem a Trump um tratamento online mais favorável.Em suas defesas, todas as três empresas negaram ter qualquer preconceito político, e seus executivos garantiram que trabalham para enfatizar sua imparcialidade. "Deixe-me ser claro: abordamos nosso trabalho sem preconceito político, ponto final", disse Pichai em seu discurso de abertura ao comitê. "Fazer o contrário seria contrário aos nossos interesses comerciais e à nossa missão".As empresas planejam defender a legislação atual, que diz que os sites não podem ser responsabilizados legalmente pelo que as pessoas postam, não importa o quão ofensivo ou prejudicial seja. A Seção 230 permitiu que empresas como Facebook, Twitter e Google se transformassem em operações massivas que permeiam quase todos os aspectos da vida moderna, sem o medo de processos judiciais paralisantes.Mas à medida que os apelos para conter o crescente poder do Vale do Silício ficam cada vez mais altos, a Seção 230 se tornou um saco de pancadas conveniente para democratas e republicanos, com legisladores de ambos os partidos defendendo a reforma ou revogação da lei."Mudá-la é uma decisão significativa. No entanto, acredito que o Congresso deve atualizar a lei para garantir que funcione como pretendido. Apoiamos as ideias sobre transparência e colaboração da indústria que estão sendo discutidas em algumas das propostas bipartidárias atuais, e estou ansioso para um diálogo significativo sobre como podemos atualizar a lei para lidar com os problemas que enfrentamos hoje", afirmou Zuckerberg.Via: Washington Post/NPR

from Olhar Digital :: Segurança https://ift.tt/2HN7syg

Grupo hacker iraniano é apontado como criador de novo malware


O grupo de hackers iranianos Seedworm está sendo apontado como o responsável pelo lançamento de um novo malware na internet. A organização também conhecida como MuddyWater, Mercury e Static Kitten já liberou ransomwares no passado.Desta vez, o mais novo projeto ficou conhecido como PowGoop: trata-se de um pacote que contém um downloader e um arquivo '.dll', e que se passam por um software de atualização do Google. Ele, então, se esconde na máquina do usuário, e consegue realizar a instalação de ransomwares no sistema.Não é a primeira vez, no entanto, que o PowGoop é usado pelo Seedworm em situações de ataques cibernéticos. No início deste ano, o grupo utilizou do programa para obter acesso a sistemas de uma entidade estatal Irianiana, com o intuito de instalar o ransomware Thanos nos computadores.ReproduçãoOs ataques de ransomware têm se tornado cada vez mais comuns na internet. Foto: rawf8/Shutterstock“Embora não possamos confirmar a conexão, acreditamos que os atores que implantaram o ransomware Thanos na organização estatal do Oriente Médio também usaram um downloader que chamamos de PowGoop. Os atores usariam o downloader PowGoop para chegar a um servidor remoto para baixar e executar scripts PowerShell adicionais”, afirmou relatório da Palo Alto Networks, em setembro.Também foram registradas funcionalidades que deixariam o PowGoop mais potencialmente perigoso, como a possibilidade de monitorar novos dispositivos de armazenamento móveis conectados aos computadores e também a possibilidade de sobrescrever o registro MBR dos sistemas, tendo assim maior controle sobre as máquinas.A Clear Sky determinou, em relatório, que há grande possibilidade que o PowGoop tenha um objetivo de destruição maior que simplesmente a instalação de um ransomware para barganha. “Embora não tenhamos visto a execução da destruição em campo, devido às suas capacidades destrutivas, um propósito de ataque é mais provável do que um ransomware que está sendo implantado para fins financeiros”.Ransomware é um tipo de software que, ao ser instalado em um computador, sequestra arquivos e bloqueia seu acesso por parte do usuário. Em seguida, cobra um 'resgate' pela liberação do conteúdo. A prática tem se tornado popular, e casos de ataques cresceram fortemente no mundo nos últimos meses.Fonte: Security Week

from Olhar Digital :: Segurança https://ift.tt/37OdObx

'Watch Dogs: Legion' Tackles Surveillance Without Humanity

The game envisions a near-future full of techno-dystopian surveillance, but doesn't have much to say about the people it affects.

from Security Latest https://ift.tt/2G6kNkv

New Research Reveals the Hidden Downsides of Link Previews

The feature is convenient, but it can also leak sensitive data, consume bandwidth, and drain batteries. And some sites are worse than others.

from Security Latest https://ift.tt/3kAAlMo

Site de campanha de Trump é hackeado e substituído por página mineradora de criptomoeda


Na terça-feira (27), o site da campanha do presidente Donald Trump foi hackeado e substituído por uma página para coletar criptomoedas. Além disso, uma mensagem dizia que "o mundo está farto das notícias falsas espalhadas diariamente pelo presidente Donald J Trump. É hora de permitir que o mundo saiba a verdade".Os invasores afirmaram ter informações sobre "a origem do coronavírus" e outros dados que desacreditavam o presidente dos Estados Unidos. Para divulgar as descobertas, os hackers forneceram dois endereços do Monero, uma criptomoeda fácil de enviar e difícil de rastrear. Por conta disso, ela foi muito associada a casos parecidos.Cada endereço tinha uma função. O primeiro era para que as "informações estritamente sigilosas" fossem divulgadas ao público, enquanto o outro, era para quem preferisse mantê-las em segredo. Após um período não especificado, o total seria comparado e o que recebesse o valor mais alto determinaria o que seria feito.ReproduçãoSite de campanha de Donald Trump foi invadido por hackers. Foto: TechCrunch/ReproduçãoO site foi revertido para seu conteúdo original poucos minutos depois. Tim Murtaugh, diretor de comunicações da campanha, confirmou o hack, mas destacou que não houve exposição de dados confidenciais. Ao contrário do que os criminosos alegaram, não há indicações de que conversas internas e secretas foram expostas.Apesar da proximidade das eleições, não há indícios de que o ataque tenha sido patrocinado por algum rival político. Os sites de campanhas e relacionados costumam ser alvos de alto valor para golpes como este. Isso porque eles não são tão seguros quanto domínios oficiais. Esses golpes costumam durar pouco tempo online e geralmente têm como alvo plataformas com alta visibilidade, como contas de celebridades. Pouco tempo depois, são retirados do ar.Esta não foi a primeira vez que o presidente dos EUA foi hackeado. Recentemente, sua conta do Twitter foi brevemente sequestrada por alguém que descobriu sua senha ("maga2020!").Via: TechCrunch

from Olhar Digital :: Segurança https://ift.tt/2HIFUtw

[Webinar and eBook]: Are You’re Getting The Best Value From Your EDR Solution?

Many companies rely on Endpoint Detection and Response (EDR) solutions as their primary security tool to protect their organizations against cyber threats. EDR was introduced around eight years ago, and analysts now peg the EDR market size as $1.5 to $2.0 billion in annual revenue globally, expecting it to quadruple over the next five years. The recent introduction of Extended Detection and

from The Hacker News https://ift.tt/3kwxunI

Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak

Check Point Software’s Learning and Training department’s main mission is to make cyber security knowledge accessible to everyone. In just a few months, students and security professionals from all over the world consumed over 1,000,000 free minutes of training, leveraging the wide range of Check Point’s eLearning content. The eLearning offering is designed for professionals…

The post Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak appeared first on Check Point Software.



from Check Point Software https://ift.tt/37RJjRV

Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data

By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point IMC Companies provides supply chain expertise to customers across the U.S. I met with David Ulloa, Chief Information Security Officer at IMC Companies, to learn how the organization protects desktop, laptop, and mobile users from malware, phishing, ransomware, and other threats. READ…

The post Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data appeared first on Check Point Software.



from Check Point Software https://ift.tt/34BiAHg

TrickBot Linux Variants Active in the Wild Despite Recent Takedown

Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren't sitting idle. According to new findings shared by cybersecurity firm Netscout, TrickBot's authors have moved portions of their code to Linux in an attempt to widen the scope of victims that could be targeted. TrickBot, a financial Trojan first detected in 2016

from The Hacker News https://ift.tt/34xCdjm

Zoom lança criptografia de ponta a ponta, mas com ressalvas


Demorou, mas chegou: a Zoom Technologies confirmou que, a partir desta terça-feira (27), as vídeo chamadas realizadas por meio de seu app - o Zoom - contarão com a criptografia de ponta a ponta (E2E, ou “end to end”, no jargão em inglês). A novidade vale para todas as plataformas: Windows, macOS, iOS e Android. Entretanto, a interface web e apps de terceiros que usem o kit de desenvolvimento do Zoom não contarão com este recurso.A criptografia de ponta a ponta chega ao Zoom, neste primeiro momento, como uma prévia: pelos próximos 30 dias, a empresa vai coletar feedback dos usuários e usar as informações reunidas para aprimorar a privacidade. De qualquer forma, a função continuará funcionando após este prazo.ReproduçãoDepois de muita espera, usuários do Zoom agora terão criptografia de ponta a ponta, aprimorando a privacidade das vídeo chamadas. Imagem: Ymphotos/ShutterstockDesde o início da pandemia, o Zoom ascendeu em popularidade em meio à necessidade de empresas de remanejar seus funcionários para o trabalho remoto. A condução de reuniões em vídeo contribuiu para que o app fosse um dos mais populares no setor; por outro lado, acabou expondo problemas graves de segurança em seu uso. Em alguns casos, hackers conseguiram invadir chamadas e distribuir spams pornográficos, enquanto pesquisadores revelaram que era possível “encontrar” chamadas em curso apenas adivinhando o seu endereço (URL).A situação chegou ao seu ápice após uma reportagem do The Intercept, que revelou que o Zoom praticou propaganda enganosa ao prometer, em seu site e white paper, a criptografia de ponta a ponta, mas não entregá-la no uso do app. Desde então, o CEO da Zoom Technologies, Eric Yuan, tomou uma série de atitudes comprometidas com o aprimoramento do serviço, como contratar a consultoria de Alex Stamos, ex-chefe de segurança do Facebook e Yahoo.A partir daí, diversas atualizações ao serviço inseriram novos recursos de privacidade. Anteriormente, o Zoom oferecia criptografia, mas ela era limitada entre os participantes das chamadas e os servidores da empresa. Com a criptografia de ponta a ponta, agora nem mesmo a própria Zoom Technologies sabe do conteúdo discutido em uma vídeo chamada. Esse mesmo recurso de privacidade é empregado por apps igualmente populares, como WhatsApp e Telegram.A criptografia de ponta a ponta do Zoom vale para usuários gratuitos e pagantes, e está sendo implementada de forma gradual.Fonte: The Verge / Intercept

from Olhar Digital :: Segurança https://ift.tt/2Hw8hM9

North Korean Advanced Persistent Threat Focus: Kimsuky

Original release date: October 27, 2020

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.

This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF). This advisory describes the tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky—against worldwide targets—to gain intelligence on various topics of interest to the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.cisa.gov/northkorea.

This advisory describes known Kimsuky TTPs, as found in open-source and intelligence reporting through July 2020. The target audience for this advisory is commercial sector businesses desiring to protect their networks from North Korean APT activity.

Click here for a PDF version of this report.

Key Findings

This advisory’s key findings are:

  • The Kimsuky APT group has most likely been operating since 2012.
  • Kimsuky is most likely tasked by the North Korean regime with a global intelligence gathering mission.
  • Kimsuky employs common social engineering tactics, spearphishing, and watering hole attacks to exfiltrate desired information from victims.[1],[2]
  • Kimsuky is most likely to use spearphishing to gain initial access into victim hosts or networks.[3]
  • Kimsuky conducts its intelligence collection activities against individuals and organizations in South Korea, Japan, and the United States.
  • Kimsuky focuses its intelligence collection activities on foreign policy and national security issues related to the Korean peninsula, nuclear policy, and sanctions.
  • Kimsuky specifically targets:
    • Individuals identified as experts in various fields,
    • Think tanks, and
    • South Korean government entities.[4],[5],[6],[7],[8]
  • CISA, FBI, and CNMF recommend individuals and organizations within this target profile increase their defenses and adopt a heightened state of awareness. Particularly important mitigations include safeguards against spearphishing, use of multi-factor authentication, and user awareness training.

This product is provided subject to this Notification and this Privacy & Use policy.



from CISA All NCAS Products https://ift.tt/2G9rrXq

Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security

Remember when only desktop computers in our homes had connections to the internet? Thanks to the latest developments in smart device technology, almost everything now can be connected— security cameras, smart TVs, gaming consoles, and network storage, to name just a few. While a home network provides lots of benefits, it can also expose us to safety and privacy risks.

But checking for those risks need not be costly. How about a network security checker available for free? Yes, you read that right. Trend Micro’s free Housecall for Home Networks (HCHN) scans the connected devices in your home network and detects those that pose security risks. And in doing so, it gives you a sense for what real network security entails. We have a solution for that also.

Want to know more?

Trend Micro HCHN uses intelligent network scanning technology to scan the devices connected to your home network for vulnerabilities. These can range from a low risk type—such as an easily identifiable Wi-Fi Name that hackers can use to attack your router and home network—to high risk types, such as SSL-Poodle (for man-in-the-middle attacks), Shellshock (for remote code execution attacks), Heartbleed (which puts website passwords at risk) and WannaCry (which is a Windows ransomware cryptoworm). These and other vulnerabilities can be detected through the help of this handy tool.

In addition, HCHN checks devices for open ports that are usually targeted by hackers and malware and can be exploited for cybercriminal activities. Examples include ports 20 and 21, used via the File Transfer Protocol (FTP) to transfer files between an FTP client (20) and FTP server (21), which can deliver a multitude of vulnerabilities to the internet; as well as port 23, which sends data in Clear Text, which can be used by attackers to listen in, watch for credentials, or inject commands, enabling the hacker to perform Remote Code Executions.

Moreover, HCHN gives you a report about the status of your home network and its connected devices and offers helpful advice for keeping your network and devices secure.

Lastly, HCHN provides you a notification when:

  • A new device joins the network
  • Connecting to a new network
  • A new vulnerability is found in the network.

 

Ready to install?

HCHN is easy to use and accessible from any device, be it Windows (7, 8 and 10), MacOS (10.12 or later), Android (5.0 or later) or iOS (8.0 or later). For your computer hardware, you just need to have Intel Pentium or compatible processor, a 256MB of RAM (512MB recommended) with at least 50MB available disk space and you’re set.

  • Download and install the application from the Web, Google Play Store or Apple App Store.
  • During install, accept the Privacy and Personal Data Collection Disclosure Agreement which indicates the necessary information gathered in order to check for and identify vulnerabilities in devices connected to your home network and you’re good to go.
  • Once installed, inspect your home network’s security risk exposure by clicking (applies to Windows and MacOS) or tapping (applies to Android and iOS) Scan Now. You’re then presented with the result.

 

Are my home network and connected devices safe?

Here’s a few scans we did–from a Windows PC, then from and Android and iOS devices.

When the scan is complete on a Windows computer it shows two tabs: Home Network and Devices.

The first tab indicates a snapshot of your home network, identifying the devices at risk.

Figure 1. HouseCall for Home Networks – Home Network

The second tab indicates a list of the devices scanned and the details of any device risks found.

Figure 2. HouseCall for Home Networks – Device List

On the Android device, once the scan has finished, the screen will reveal any security risks detected. You can view the issue to see more details of the security risk in your home network. You can then slide to the next panel and check to verify all the connected devices on your network.

Figure 3. HCHN – At Risk Devices

Similarly, upon completing the network scan from an iOS device, the app will display the risk that needs your attention. Just as with the Android device, you can move to the next panel to review the list of connected devices that were identified by Trend Micro HCHN.

Figure 4. HCHN – Needs Attention

A Few Reminders and Recommendations …

  • Use HCHN regularly to check the posture of your home network security, since new vulnerabilities and network risks may appear in the device after a time due to lack of firmware updates or a failure by the manufacturer to address a newfound risk.
  • Ensure that the devices (including mobile devices such as phones or tablets) are on and connected to the network when a scan is performed.
  • Some security products installed from the device initiating the network scan might detect the scan as suspicious and show a warning message or block user access. This doesn’t mean that HCHN is a malicious application. Add HNCN to your security product’s exception list, so it’s allowed to examine your network and connected devices for security risks.
  • The HNCN app does not automatically block dangerous network traffic or suspicious devices from connecting to your network. For that, and more home network security features, you should increase your home’s network protection with Trend Micro Home Network Security. To that we now turn.

What Home Network Security Provides

While a free network scan helps to determine the underlying dangers in your home network, to fully protect not only your home network but your family, you should consider Trend Micro Home Network Security (HNS) as a permanent enhancement to your network. It can shield your home against a wide variety of threats, including network intrusions, risky remote connections, phishing, ransomware, harmful websites and dangerous downloads. Additional features include the following:

  • New Device Approval gives you control over the devices that are allowed access to your home network.
  • Remote Access Protection limits malicious individuals from using remote desktop programs to connect to your devices at home.
  • Voice Control lets you issue voice commands to Alexa or Google Home to perform specific functions on HNS such as conducting a scan, obtaining your home network’s security status, pausing internet usage, disabling internet access for a user, and so on.
  • Parental Controls’ flexible and intuitive feature set, comprised of Filtering, Inappropriate App Used, Time Limits and Connection Alerts, can help any parent to provide a safe and secure internet experience for their kids. Combined with Trend Micro Guardian, parents can extend these protections to any network their children connect to, Wi-Fi or cellular.

Download the HNS App on your Android or iOS device to give it a spin. Note that the HNS App, when used by itself, performs the same functions as the HCHN app on those devices.

If you like what you see, pair the HNS App to a Home Network Security Station to get the full range of protections. (Note too that once you do, the HCHN App will be disabled on all your devices and network and replaced by Home Network Security.)

Figure 5. Home Network Security (HNS) App

Figure 6. HNS App Paired with the Home Network Security Station

Final Words

Home networks come with security risks. As the tech-savvy member of your household, you need to be aware of those risks. Using Trend Micro HouseCall for Home Networks (HCHN), you’ll be able to know which devices are connected to your home Wi-Fi network and whether these devices bear security risks that can be exploited by hackers and malicious software. Moreover, you’ll be provided with suggestions, in case your devices are found vulnerable.

However, just knowing the security risks is only half the battle in protecting your home network. You’ll need a more robust system that can automatically block suspicious and malicious traffic and do more— such as protecting your child’s online safety. Trend Micro Home Network Security (HNS) can address your home network’s security, even as it monitors your home network, prevents intrusions, blocks hacking attempts and web threats, and protects your family’s privacy, while keeping the internet safe for your kids.

Download Trend Micro Housecall for Home Networks from the Web, Google Play Store or Apple App Store to give it a try.

Go to Trend Micro Home Network Security to get more details on the solution, or to buy.

The post Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security appeared first on .



from Trend Micro Simply Security https://ift.tt/37OjMZQ

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...