Wednesday, February 7, 2018

Meltdown and Spectre malware samples in the wild increasing

Security Digest
Information security news and advice from TechTarget's network| February 7, 2018
TechTarget
FEATURED STORY
Meltdown and Spectre malware discovered in the wild
by Rob Wright, Executive Editor
Nearly 140 samples of malware that exploit the Meltdown and Spectre vulnerabilities have been discovered by AV-TEST, but most samples are based on existing proof-of-concept code. (SearchSecurity.com)
Advertisement
NEWS
 
Cryptojacking malware using EternalBlue to build botnets
Proofpoint researchers discovered a large Monero mining botnet that uses EternalBlue to spread, and it isn't the first time the Windows flaw has been used for cryptojacking. (SearchSecurity.com)
 
Google got faster pulling bad Android apps from Play Store
Google claims it is faster than ever at removing or rejecting bad Android apps from the Play Store before anyone has a chance to install the troublesome app. (SearchSecurity.com)
 
Hackers use ATM jackpotting technique to steal $1M in US
News roundup: Hackers used ATM jackpotting attacks to steal over $1M in the U.S. Plus, a fitness tracking app accidentally exposed the locations of military bases, and more. (SearchSecurity.com)
 
Risk & Repeat: Meltdown and Spectre mitigation efforts stumble
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Meltdown and Spectre mitigations efforts and why they're struggling with bad updates and miscommunication. (SearchSecurity.com)
EXPERT ADVICE
 
Bypassing facial recognition: The means, motive and opportunity
Researchers bypassed Apple's facial recognition authentication program, Face ID, in under a week. Expert Michael Cobb explains why it's not a major cause for concern for users. (SearchSecurity.com)
 
What cloud storage security looks like for small businesses
Cloud storage security and compliance can be a challenge for smaller businesses. Expert Dave Shackleford outlines the most important parts of cloud security for SMBs. (SearchCloudSecurity.com)
 
How to manage application security risks and shortcomings
A lack of proper testing, communication and insight into best practices all contribute to application security shortcomings. Kevin Beaver explains how to manage the risks. (SearchSecurity.com)
 
Fight a targeted cyberattack with network segmentation, monitoring
It takes a variety of tactics, including network segmenting and monitoring, to safeguard the network. Learn the latest defenses to keep your network safe. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

No comments: