Threatpost News Wrap Podcast for May 18
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news. Go to Source
Threatpost editors Tom Spring, Tara Seals and Lindsey O’Donnell discuss the week’s information security news. Go to Source
A recently discovered malware steals cache data and messaging sessions from the desktop version of encrypted messaging service Telegram. Go to Source
Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials. Go to Source
An array of malicious Android apps purporting to be popular game Fortnite are instead harvesting call logs and downloading cryptomining malware. Go to Source
A team of academic researchers has demonstrated that it’s possible to possible to closely mimic legitimate voice commands in order to carry out nefarious actions on these home assistants. Go to Source
The company urges customers to patch three vulnerabilities that received the highest severity rating of 10. Go to Source
Threatpost talked to several security researchers about what’s changed in the past year. Go to Source
Deception technology is an emerging category of cyber defense that is particularly useful when it comes to IoT devices, SCADA systems and medical devices. Go to Source
Researchers have discovered a set of custom surveillanceware tools being deployed against Android and iOS devices primarily in the Middle East. Go to Source
Sources said the funds were diverted to fraudulent accounts in a coordinated heist that involved hundreds of wire transfers and on-the-ground accomplices. Go to Source