Google Rolls Out End-to-End Encryption for Android Messages

The Security Magazine dwell on Google finally introducing E2EE for its Message platform.

Google has finally announced that end-to-end encryption (E2EE) will begin rolling out on its Messages platform, bringing it in line with rivals WhatsApp and iMessage in the security stakes.

Messages by Google is built on the open Rich Communication Services (RCS) standard to offer improvements over legacy SMS such as anti-spam, launching of video calls direct from conversations, Smart Reply and more

Read further on the Security Magazine

 


UN and Europol Warn of Growing AI Cyber-Threat

InfoSecurity Magazine published a report on growing threat of AI cybercrime

Cyber-criminals are just getting started with their malicious targeting and abuse of artificial intelligence (AI), according to a new report from Europol and the UN.

Compiled with help from Trend Micro, the Malicious Uses and Abuses of Artificial Intelligence report predicts AI will in the future be used as both attack vector and attack surface.

Read more on the InfoSecurity Magazine


ThreatList: Pharma Mobile Phishing Attacks Turn to Malware

As companies fight for leadership in developing COVID-10 vaccine, cybercriminals do not rest as well...

After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery.

As pharmaceutical companies such as Pfizer race to develop a vaccine for COVID-19, mobile phishing gangs are swapping up their tactics in hopes to get their hands on critical research.

Read further on the Threat Post


Deception Technology: No Longer Only A Fortune 2000 Solution

The Hacker News reported on the latest developments in deception technology which made it more affordable.

A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable - intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired no longer works.

Unknowingly, the attacker triggered a well-concealed trap that detected his presence, took immediate action to sever his connection, and then blocked his reconnect ability. Very cool.

Read more on The Hacker News


Check Point Software. Security Report 2020

Over 770 million email addresses and 21 million unique passwords were exposed in a popular hacking forum after hosted in the cloud service MEGA. It became the single largest collection of breached personal credentials in history, named Collection #1

Download

Remote Working Exposing Businesses to Unforeseen Threats

The Infosecurity Magazine reported on unforeseen dangers of major shift to remote jobs.

The sudden shift to remote working this year as a result of COVID-19 has left businesses at far higher risk of cyber-attacks, largely due to their corporate infrastructure being exposed to attack vectors and threats that would not have been considered a year ago.

This is according to Bitdefender's The New Normal State of Cybersecurity report, which showed that businesses are particularly at risk of attacks exploiting unpatched vulnerabilities that are under a year old, with 36.37% of all unpatched vulnerabilities involving CVEs that were assigned in 2019 in the first half of 2020.

Read more on The Infosecurity Magazine


New Chrome Zero-Day Under Active Attacks: Update Your Browser

The Hacker News reported on actively exploited zero-day flaw in the Chrome browser.

Google has patched a second actively exploited zero-day flaw in the Chrome browser in two weeks, along with addressing nine other security vulnerabilities in its latest update.

The company released 86.0.4240.183 for Windows, Mac, and Linux, which it said will be rolling out over the coming days/weeks to all users...

Read more on The Hacker News