Giorgio

A week in security (April 21 – April 27)

Last week on Malwarebytes Labs: AI is getting “creepy good” at geo-guessing Zoom attack tricks victims into allowing remote access to install malware and steal money Android malware turns phones into malicious tap-to-pay machines 4.7 million customers’ data accidentally leaked to Google by Blue Shield of California Shopify faces privacy lawsuit for collecting customer data […]

A week in security (April 21 – April 27) Leggi tutto »

Zoom attack tricks victims into allowing remote access to install malware and steal money

Be careful when talking to people you’ve not met with before over the Zoom video conferencing system; you might get more than you bargained for. Two CEOs were recently targeted by a Zoom-based attack. One spotted it in time – and sadly, one did not. The attack is by a crime group that the Security

Zoom attack tricks victims into allowing remote access to install malware and steal money Leggi tutto »

Android malware turns phones into malicious tap-to-pay machines

Got an Android phone? Got a tap-to-pay card? Then you’re like millions of other users now at risk from a new form of cybercrime – malware that can read your credit or debit card and hand its data over to an attacker. A newly discovered malicious program effectively turns Android phones into malicious tap machines

Android malware turns phones into malicious tap-to-pay machines Leggi tutto »

4.7 million customers’ data accidentally leaked to Google by Blue Shield of California

Blue Shield of California leaked the personal data of 4.7 million people to Google after a Google Analytics misconfiguration. The tech giant may have used this data for targeted advertising, according to Blue Shield, which is one of the largest health insurers in the US. In a data breach notice on its website, Blue Shield

4.7 million customers’ data accidentally leaked to Google by Blue Shield of California Leggi tutto »

All Gmail users at risk from clever replay attack

Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name

All Gmail users at risk from clever replay attack Leggi tutto »

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

This week on the Lock and Code podcast… If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you. Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental

Did DOGE “breach” Americans’ data? (Lock and Code S06E08) Leggi tutto »

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

This week on the Lock and Code podcast… If you don’t know about the newly created US Department of Government Efficiency (DOGE), there’s a strong chance they already know about you. Created on January 20 by US President Donald Trump through Executive Order, DOGE’s broad mandate is “modernizing Federal technology and software to maximize governmental

Did DOGE “breach” Americans’ data? (Lock and Code S06E08) Leggi tutto »