Former England international footballer Sol Campbell has hosted a defensive masterclass for small businesses to help them protect themselves against cybercrime. Research by Barclays has found, on average, London businesses have lost over £50,000 each as a result of cybercrime. It also found more than half of London businesses have been targeted by a scam or fraudulent activity, and 24% have had to make staff redundant in order to recoup the money lost.
Researchers have unearthed a fresh new set of ways attackers could potentially exploit data-leaking Spectre CPU vulnerabilities in Intel chips. German publication Heise reported that eggheads are preparing to disclose at least eight new CVE-listed vulnerability reports describing side-channel attack flaws in Chipzilla’s processors.
Twitter Inc urged its more than 330 million users to change their passwords after a glitch caused some to be stored in readable text on its internal computer system rather than disguised by a process known as “hashing”.
The latest version of the Kitty malware family is targeting Drupal websites in an effort to mine cryptocurrency. According to researchers from Imperva’s Incapsula, Kitty is the latest malware to attack the Drupal content management system (CMS) for the purpose of cryptojacking.
LoJack for Laptops, a software tool designed to rat on computer thieves, appears to be serving a double purpose – by seemingly working with a Russian state-sponsored hacking team. The application allows administrators to remotely lock and locate, and remove files from, stolen personal computers. It’s primarily aimed at corporate IT types who want to protect stuff that gets nicked, but anyone can use it, and it is installed by default on various notebooks.
GravityRAT is a Trojan which checks the temperature of a system to detect the presence of virtual machines (VMs) and prevent efforts at analysis by researchers. By taking thermal readings, the Remote Access Trojan (RAT), which has become a recent menace in India, attempts to find out whether or not VMs are being employed for the purpose of decompiling efforts and reverse engineering.