• img January 04, 2019

Unlocking the Power of Biometric Authentication with Behavior Analytics

There are three common types of authentication: something you know (like a password), something you have (like a smart card), and something you are (like a fingerprint or another biometric method). Modern best practices recommend that you use at least two of these in parallel to be able to truly secure your identity as you […]

Read More
  • img January 03, 2019

A Dozen Flaws in Popular Mac Clean-Up Software Allow Local Root Access

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/a-dozen-flaws-in-popular-mac-clean-up-software-allow-local-root-access/

Read More
  • img January 03, 2019

Cybercriminals Hide Malware Commands in Malicious Memes

Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.  The method used to conceal malicious commands is called steganographyand has long been abused by cybercriminals to hide malicious payloads inside files in order to evade security solutions. Several years ago, security researchers observed […]

Read More
  • img January 03, 2019

Miori IoT Botnet Targets Vulnerability in ThinkPHP

A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn. Dubbed Miori, the threat leverages a relatively new exploit that was published on December 11, and which targets ThinkPHP versions prior to 5.0.23 and 5.1.31. Other actors might also target ThinkPHP for […]

Read More
  • img January 03, 2019

Apple Phone Phishing Scams Getting Better

A new phone-based phishing scam that spoofs Apple Inc. is likely to fool quite a few people. It starts with an automated call that display’s Apple’s logo, address and real phone number, warning about a data breach at the company. The scary part is that if the recipient is an iPhone user who then requests […]

Read More