CONTENT MARKETING SPECIALIST

At the end of each week I run past the articles we published on our social media accounts, to prepare this weekly roundup of security news. Every week I’m wondering if it’s really been a quiet one or I’m just becoming immune to all the hacking and data breaches.

Two days ago we published another security alert. Remember our security alert about Mazar BOT, the Android malware? Well, it’s back and now it’s targeting users from Denmark. So far, this new campaign has infected almost 400 Android devices from Denmark and 1.500 from Italy.

We also updated two major articles, we brought the facts and illustrations up to date, have a look over:

1. A financial guide with 15 steps to maximize your financial data protection.
2. The second article walks you through the steps needed to secure your PC after a fresh Windows installation.

Now off to the roundup:



Security articles of the week


1. Viber introduces end-to end encryption

Looks like major instant messaging services are jumping on the encryption bandwagon. After WhatsApp recently announced it activated end-to-end encryption for all its users, Viber made the same announcement this week.

Their CEO declared that they’ve been working on it for a few years.

It’s a great step towards security and privacy, but users should also keep in mind that no measure is hundred percent bulletproof.


2. Why the IRS is (still) so vulnerable to attacks

On the state of the cyber security world and why the IRS is still vulnerable to hacking.


3. Google updated its User Data Policy for the Chrome Web Store

Google announced its new User Data Policy for the Chrome Web Stores. Developers will have until half of July to comply.

Some of the new requirements for developers are:
– Be transparent about the handling of user data and disclose privacy practices
– Post a privacy policy and use encryption, when handling personal or sensitive information, and
– Ask users to consent to the collection of personal or sensitive data via a prominent disclosure, when the use of the data isn’t related to a prominent feature.


4. Those who visited the Fappening forum were exposed to malware

The forum that hosted pics from the Fappening scandal also exposed users to malware.


5. Naughty America’s database was breached

Looks like 3.8 million users from Naughty America porno production house got their info leaked online. The database contains their emails and passwords.


6. Anti Apple ransomware tool was launched (and already bypassed)

A software that keeps Apple devices safe from ransomware was announced. Soon after its launch, the tool was already bypassed.


7. Exploit Kits – about the rise of user friendly malware

All you need to know about exploit kits and how malware became so user friendly malware.


8. Best way to backup your data in case of a ransomware attack

Ransomware attacks are the “hottest” cyber security threats of this moment. Here’s the best way you can backup your data.


9. Closing your social media accounts? Why that might not be safe either

A few things you should consider before deleting your social media accounts.


10. All it takes for a hacker is your phone number

This isn’t something new, it’s just been proved that it’s still possible: if someone wants to track your phone, read your texts or listen to your calls, all they need is your phone number.


Conclusion


Hope for the best, but prepare for the worst. Don’t ignore the cyber security threats we’re writing about each and every week, thinking they won’t affect you. What if they do? Is that a risk worth taking?

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP
150 queries in 2.272 seconds