Security Alerts & News
by Tymoteusz A. Góral

History
#1504 71 percent of Australian-used IoT devices failed privacy probe
The Office of the Australian Information Commissioner (OAIC) has found that 71 percent of Internet of Things (IoT) devices and services used by Australians failed to adequately explain how personal information was collected, used, and disclosed.

According to Australian Privacy Commissioner Timothy Pilgrim, the seamless nature of how IoT devices collect, store, and share user information means that customers are not always fully aware of the privacy risks.

"The Internet of Things allows for some great products and entertainment, but many of us have adopted this technology into our everyday lives without considering how much of our personal information is being captured or what happens to that information," he said.
#1503 From RAR to JavaScript: ransomware figures in the fluctuations of email attachments
Why is it critical to stop ransomware at the gateway layer? Because email is the top entry point used by prevalent ransomware families. Based on our analysis, 71% of known ransomware families arrive via email. While there’s nothing new about the use of spam, ransomware distributors continue to employ this infection vector because it’s a tried-and-tested method. It’s also an effective way to reach potential victims like enterprises and small and medium businesses (SMBs) that normally use emails for communication and daily operations. Over the first half of the year, we observed how cybercriminals leveraged file types like JavaScript, VBScript, and Office files with macros to evade traditional security solutions. Some of these file types can be used to code malware. In fact, as a security precaution, Microsoft turns off macros by default.

In this blog post, we examine various email file attachments and how ransomware affected the fluctuation in the use of these file types.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12