Daily NCSC-FI news followup 2020-04-11

How Apple and Google Are Enabling Covid-19 Contact-Tracing

www.wired.com/story/apple-google-bluetooth-contact-tracing-covid-19/ The tech giants have teamed up to use a Bluetooth-based framework to keep track of the spread of infections without compromising location privacy.

The Challenge of Proximity Apps For COVID-19 Contact Tracing

www.eff.org/deeplinks/2020/04/challenge-proximity-apps-covid-19-contact-tracing Around the world, a diverse and growing chorus is calling for the use of smartphone proximity technology to fight COVID-19. In particular, public health experts and others argue that smartphones could provide a solution to an urgent need for rapid, widespread contact tracingthat is, tracking who infected people come in contact with as they move through the world.

WooCommerce Falls to Fresh Card-Skimmer Malware

threatpost.com/woocommerce-card-skimmer-malware/154699/ The payment-card stealer differs from typical malware targeting WordPress-based e-commerce environments.

Kun sairaalaan tehtiin tietoturvahyökkäys, se oli viimeinen pisara Mikko Kenttälälle ja muille hakkereille, jotka haluavat käyttää taitojaan hyvään

yle.fi/uutiset/3-11296321 Mikko Kenttälä on kybervapaapalokunnan jäsen. Hän sammuttaa tietoturvan tulipaloja.

You might be interested in …

Daily NCSC-FI news followup 2021-09-26

Miten kiinalaisten puhelinten käy Suomessa? Näin kommentoivat operaattorit www.is.fi/digitoday/mobiili/art-2000008286255.html Suomen operaattorikolmikko ottaa väitteet puhelinten tietoturvaongelmista vakavasti, mutta myynti jatkuu toistaiseksi normaalisti. Hunting the LockBit Gang’s Exfiltration Infrastructures yoroi.company/research/hunting-the-lockbit-gangs-exfiltration-infrastructures/ Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers thehackernews.com/2021/09/colombian-real-estate-agency-leak.html More than one terabyte of data containing 5.5 million files has been left exposed, leaking […]

Read More

Daily NCSC-FI news followup 2020-08-01

Offense and Defense A Tale of Two Sides: Group Policy and Logon Scripts www.fortinet.com/blog/threat-research/offense-defense-a-tale-of-two-sides-group-policy-and-logon-scripts In this blog, we will look at Group Policy Objects (GPO) in Windows operating systems. Specifically, how they can be used to deploy and execute malicious payloads on target machines within an Active Directory environment. We will also look at ways […]

Read More

Daily NCSC-FI news followup 2021-02-13

Who is to blame for the malicious Barcode Scanner that got on the Google Play store? blog.malwarebytes.com/android/2021/02/who-is-to-blame-for-the-malicious-barcode-scanner-that-got-on-the-google-play-store/ In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update, we wrote about a barcode scanner found on the Google Play store that was infected with Android/Trojan.HiddenAds.AdQR.. All initial signs led […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.