Search
Close this search box.
Search
Close this search box.

Android Ransomware Threatens to Leak Victim Data

The attacker community is continuing to expand the variety of ransomware strains it creates, including a recent variant that doesn’t encrypt victims’ files but instead threatens to send personal data and photos to their contacts. Researchers at McAfee discovered this ransomware variant buried within a couple of apps in the Google Play app store recently. […]

Makers of ME Doc Software Say They’ve Closed Backdoor Used By NotPetya

The makers of the M.E. Doc software that has been at the center of the NotPetya malware story say they have produced an updated version of the application that does not include the backdoor that had been slipped in by attackers several months ago. “M.E.Doc has created an update that will ensure safe work in the […]

Google Adds New Anti-Phishing Feature to G Suite

Google is rolling out a new security feature for enterprises customers of its G Suite hosted apps that allows administrators to choose exactly which apps have access to user data. The feature is designed as a barrier against phishing attacks, many of which try to fool or confuse users into giving attackers access to sensitive […]

Free Wildcard Certificates Coming From Let’s Encrypt

Let’s Encrypt, the certificate authority that provides free digital certificates for site owners, plans to expand its service soon by offering wildcard certificates, as well, beginning in January. The move is designed to enable site owners to secure their main domain, along with as many subdomains as they own, with just one certificate. Normal certificates are tied to […]

New Attack Recovers Satellite Phone Crypto Key in Fraction of a Second

A team of researchers from China has developed a new attack on one of the ciphers used to secure the communications of satellite phones that enables them to recover a 64-bit key in a fraction of a second under some circumstances. The work focuses on the GMR-2 cipher used in Inmarsat satellite phones and the attack […]

Google Patches Broadpwn Flaw in July Android Update

Google has released its monthly set of Android patches for July, a release that includes fixes for many, many remote-code execution vulnerabilities, the highlight of which is a serious bug in some Broadcom chipsets that affects a lot of Android devices, as well as some iPhones. That vulnerability, which is known as Broadpwn, will be detailed […]

Ukrainian Police Seize Servers in NotPetya Investigation

UPDATE–Police in Ukraine have confiscated several servers from the software company that develops the M.E. Doc accounting software that is believed to have been an unwitting part of the distribution process for the NotPetya ransomware. Soon after the emergence of NotPetya last week, security researchers from several organizations zeroed in on the update mechanism for the […]

Looking Back | Call Center Week

Last week, the 18th annual Call Center Week, arranged by the International Quality and Production Center (IQPC), took place at the Mirage in Las Vegas. Featuring a number of global leaders and keynote speakers, as well as a multitude of workshops, exhibitors, and sponsors, the conference aimed to personalize the journey to perfecting the customer […]

FTC Throws Support Behind FCC’s Proposed Anti-Robocall Rule

The FTC is supporting the efforts of the FCC to expand the definition of what constitutes and illegal call and make life more difficult for telemarketers and robocall operators. In comments sent to the FCC this week, the FTC said that a proposed rule that would allow the establishment of a broad Do Not Originate […]