A Week in Security (Jun 1 – 7)
Here’s a review of last week’s posts on Malwarebytes Unpacked:
- Press H To Hack: Hacking in Video games (Hacking) The release of Watch Dogs, a popular video game, inspired one of our researchers to take a look back and tackle on hacking in games, which is really not a new concept. In fact, it has been around for more than a decade.
- Skype Chatbot Scam fails Turing test miserably (Fraud/Scam Alert) One of our researchers had a long exchange with a chatbot on Skype. This blog details that, including notes on why it’s not as sophisticated as other bots he encountered.
- Survey Scammers Bait Users with FIFA Coins (Fraud/Scam Alert) Die-hard FIFA video game players and enthusiasts are targeted once again in this latest lure we found about getting free coins for nothing, only to find out that it’s a survey scam.
- The Facebook “Cash From Home” Kit (Online Security) We found a site tricking users into believing that Facebook is hiring, as part of its so-called “Work from Home Program”, and that all interested parties would have to do is pay $1.95 for application processing. Of course, this is not true.
Top news stories:
- Parents in the dark over kids’ online life. Latest survey reveals that parents in Australia have no clue as to what their children are getting up to online. According to our friends at Symantec, a third of the kids interviewed have either been victimized by bullying or cybercrime, yet they never tell their parents about it. (Source: The Daily Mail)
- New Heartbleed Attack Vectors Impact Enterprise Wireless, Android Devices. A Portuguese researcher debunked the theory that Heartbleed can only exploit devices over certain connections. He dubbed the attack “Cupid”, and it can affect enterprise wireless networks and other connected devices, such as Android smartphones. (Source: SecurityWeek)
- Soraya malware targets payment card data on POS devices and home computers. Move over, ZeuS, a new information stealer is in town. Unlike the famous malware family, Soyara is known to target point-of-sale (POS) devices, using a scraping technique that was first seen in the Dexter malware. (Source: SC Magazine)
Stay secure, everyone!