Larry Jaffee SC Media | Page 3 of 18

Larry Jaffee

Most recent articles by Larry Jaffee

electric power

Is the electric grid closer to a devastating cyberattack that could mean lights out?

Could the electric grid really be taken down with a $50 device secreted in the bottom of a coffee cup as some researchers have claimed? Perhaps. But the more likely threat comes from bad actors with markedly improved capabilities who’ve ramped up their attacks on critical infrastructure and utilities. Consider that 70 percent of industrial…

1,200 iOS apps unknowingly handing over dollars to Chinese ad platform

Malicious code embedded in the Chinese mobile ad platform Mintegral SDK, used by 1,200-plus iOS apps downloaded more than 300 million times monthly, is siphoning off advertising dollars. The Mintegral SDK platform is intended to give app developers and advertisers an opportunity to monetize their ad-based marketing. But researchers from Snyk found evidence that other…

SMBs assaulted by ‘mercenary’ DeathStalker APT espionage campaigns

The hacker collective known as DeathStalker has recently widened its footprint to include small to medium-sized business (SMB) targets in the financial sector throughout Europe, Middle East, Asia and Latin America. Deathstalker’s tactics, techniques and procedures aren’t different from when it first emerged as a hacker-for-hire, according to Kaspersky, which tracked Deathstalker’s activities for the…

Apple OS developer supply chain threatened by ‘clever’ malware attack

In an attack described as a “clever” supply-chain threat, XCSSET malware is being injected undetected into programs created by unwitting Xcode Apple developers who share their projects on the GitHub repository. The “unusual infection” can pilfer infected users’ credentials, accounts and other vital data, according to a blog post from researchers at Trend Micro who…

Tesla RAT adapts, evolves to thwart security

It may be unsophisticated but the Agent Tesla RAT is “street-wise,” adapting and evolving just enough to wreak havoc on organizations’ security efforts. Recent improvements to the malware include more robust spreading and injection methods, as well as discovery and theft of wireless network details and credentials, according to an analysis by SentinelOne. Expanding its…

Business must overcome privacy challenge for facial recognition to thrive

Pharmacy chain Rite-Aid’s recent abandonment of an eight-year-old facial recognition program aimed at curbing shoplifting as well as creating new marketing underscores how widespread the use of the controversial technology is and how organizations struggle to overcome associated security and privacy challenges – as well negative perceptions.

Trade minister hack led to trade secrets leak before U.K. election

The hack of a U.K. trade minister’s email account – the result of a spear phishing campaign likely engineered by Russian operatives –  led to the leak of U.S.-U.K. trade documents and perpetuated a disinformation campaign credited with influencing the 2019 U.K. election. Hackers were able to successfully access the email of Trade Minister Liam…

Next post in Security News