Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 1 to 10
Fake Photo Beautification Apps On Google Play Can Read SMS Verification Code To Trigger Wireless Application Protocol (WAP)/Carrier Billing
18th Oct 2019 [28 hours ago] from TrendMicro
We found an app on Google Play named “Yellow Camera”, which poses as a camera and photo beautification or editing app embedded with a routine of reading SMS verification codes from the System Notifications, and, in turn, activate a...
Fleecing The Onion: Darknet Shoppers Swindled Out Of Bitcoins Via Trojanized Tor Browser
18th Oct 2019 [30 hours ago] from ESET Research
ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers The post Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser appeared first...
Best Practices For Adding Layered Security To Azure Security With Check Point’s CloudGuard IaaS
17th Oct 2019 [39 hours ago] from Microsoft
Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices. The post Best practices for adding layered security to Azure security with Check Point’s CloudGuard...
Definitive Dossier Of Devilish Debug Details – Part Deux: A Didactic Deep Dive Into Data Driven Deductions
17th Oct 2019 [2 days ago] from FireEye Research
In PartOne of this blog series, Steve Miller outlined what PDB pathsare, how they appear in malware, how we use them to detect maliciousfiles, and how we sometimes use them to make associations about groupsand actors.As Steve continued...
What Was Wrong With Alexa? How Amazon Echo And Kindle Got KRACKed
17th Oct 2019 [2 days ago] from ESET Research
ESET Smart Home Research Team uncovers Echo, Kindle versions vulnerable to 2017 Wi-Fi vulnerabilities The post What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed appeared first on WeLiveSecurity
Operation Ghost: The Dukes Aren’t Back – They Never Left
17th Oct 2019 [2 days ago] from ESET Research
ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families The post Operation Ghost: The Dukes aren’t back – they never left appeared first on WeLiveSecurity
When Card Shops Play Dirty, Consumers Win
16th Oct 2019 [3 days ago] from Krebsonsecurity
Cybercrime forums have been abuzz this week over news that BriansClub -- one of the undergrounds largest shops for stolen credit and debit cards -- had been hacked, and its inventory of 26 million cards leaked to security contacts in the...
Top 6 Email Security Best Practices To Protect Against Phishing Attacks And Business Email Compromise
16th Oct 2019 [3 days ago] from Microsoft
What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture. The post...
Guarding Against Supply Chain Attacks—Part 1: The Big Picture
16th Oct 2019 [3 days ago] from Microsoft
Paying attention to every link in your supply chain is vital to protect your assets from supply chain attacks. The post Guarding against supply chain attacks—Part 1: The big picture appeared first on Microsoft Security.
Microsoft’s 4 Principals For An Effective Security Operations Center
15th Oct 2019 [4 days ago] from Microsoft
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC. The post Microsoft’s 4 principals for an effective security operations center appeared...
1 2 3 4 5 6 7 8 9 10 Older »