FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

Known macOS Vulnerabilities Led Researcher to Root Out New Flaws

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Researcher shares how he unearthed newer bugs in Apple's operating system by closer scrutiny of previous research, including vulnerabilities that came out of the Pwn2Own competition.

  • May 12th 2022 at 13:45

5 Years That Altered the Ransomware Landscape

By Jai Vijayan, Contributing Writer, Dark Reading
WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.

  • May 12th 2022 at 13:00

Google Will Use Mobile Devices to Thwart Phishing Attacks

By Dark Reading Staff, Dark Reading
In an effort to combat phishing, Google will allow Android phones and iPhones to be used as security keys.

  • May 12th 2022 at 11:51

Nokia Opens Cybersecurity Testing Lab

By Dark Reading Staff, Dark Reading
The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.

  • May 12th 2022 at 12:31

On the Air With Dark Reading News Desk at Black Hat Asia 2022

By Dark Reading Staff, Dark Reading
This year's Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.

  • May 12th 2022 at 11:41

Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study

By McAfee

How do parents and children connect and protect themselves online? We spoke with thousands of them around the world to find out.

In December 2021 we conducted a study about beliefs and behaviors about life online among members of connected families—as individuals and as a family unit. Parents and children were surveyed together, with parents answering first and then bringing their children in to consent and answer, leading to findings that represent connected families across 10 different nations.

Through this study, we uncovered universal beliefs about online protection, along with several nuances, all of which pinpointed several tensions between parents and children when it comes to staying safe while enjoying life online.

Four broader topics presented themselves through this study, with each topic presenting several follow-on findings. Here, we’ll take a look at each topic and touch on a few of the several findings found within each, followed by a link where you can download the full report with its complete set of insights and trends.

Topic One: Mobile Maturity

While our tweens and tweens seem to grow into adults right before our eyes, their lives online mature into adulthood as well—thanks in large part to their mobile devices.

Our study found that children between 15 and 16 years old see their mobile usage jump significantly, so much so that it approaches levels that they will carry into adulthood. Yet their connected lives start much earlier, with smartphones and mobile devices leading the way online. The result is that most tweens and young teens today have access to the expansive internet in the palm of their hand, which exposes them to the broader internet full of apps, chats, entertainment, and social media—along with the benefits and risks nearly right away.

As far as the risks are concerned, tweens and young teens reported on their experience with cyberbullying, account theft, and unauthorized use of their personal data. Here it appears that several children were exposed to these risks at an early age.

While these experiences start early with 10–14-year-olds, exposure to online risks only increase as teens get older. By age 17 to 18, reports of cyberbullying increase to 18%, attempted theft of an online account to 16%, and unauthorized use of personal data to 14%.

Topic Two: Parents as Safekeepers

As far as life online is concerned, children look to their parents to keep them safe. While parents accept that role, our study found that they appear to have difficulty in following through.

Children said that their parents are best suited to teach them about being safe online, making them the clear winners across all categories. Nearly three-quarters of children pointed to parents, nearly twice than teachers at school (39%) and more than twice over for online resources (34%).

Looking at the reasons for that response more closely, 63% tweens and teens worldwide felt that their parents know enough to protect their security and privacy. This figure was higher for younger children (65%) and then decreased as they reached their late teens (55%). As noted earlier, an increasing number of children in their late teens have experienced online risks at this point, perhaps leading to less confidence that their parents indeed have the knowledge to keep them safe.

Parents recognize their role as protectors online, just as they recognize their responsibility to protect their children in the broader world. An overwhelming 90% of parents worldwide agreed with this sentiment. Like their children, parents felt that teachers at school played a role as well at 36%. However, their second top response was internet providers, weighing in at 41%.

Yet while parents say they view themselves as protectors, there’s a gap between intent and effort. On PCs and laptops, parents reported the online protection measures they took for themselves, which appear relatively low given the availability and ease of use with such measures—like installing antivirus software (68%), protecting the computer with a password (58%), or sticking to reputable online stores when shopping (50%).

These figures drop yet lower when asked if they took similar precautions for their children. Thus, as parents protect themselves at a low rate, they protect their children at a rate that’s yet even lower.

Moreover, when it came to protection on smartphones, the numbers were similarly low, and often lower than the rate of protection on PCs and laptops. For example, while 56% of parents said that they protect their smartphone with a password or passcode, only 42% said they do the same for their child’s smartphone—a further 14% drop.

Topic Three: The Secret Lives of Tweens and Teens Online

It’s no secret that teens and tweens may hide their activities online. In fact, they’ve said as much.

Our research found that more than half of children (59%) take some action to hide what they’re up to online. When asked for details, tweens and teens mentioned the following:

  • Clearing the browser history, 26%.
  • Close/minimize browser when parent walked in, 21%.
  • Hide or delete IMs or videos, 15%.
  • Browse with incognito mode, 15%.
  • Lie or omit details about online activities, 15%.
  • Use a device their parents don’t check, 10%.

As children grow older, these privacy-keeping activities only increase, particularly when it comes to clearing browser history and using incognito mode in their browser.

Likewise, it appears that it’s no secret children are speaking privately with people they don’t know online. When asked if they believe their children are having conversations without knowing a person’s real identity, 34% of parents said yes. As for children, 37% said yes, marking a 3% difference in awareness between parents and children.

Broken down by age bracket, 36% of children from ages 10 to 14 say they’re having these conversations, which jumps up to 41% at ages 15 to 16. Later, from ages 17 to 18, that figure drops to 39%.

Topic Four: Gendered Protection Bias

Parents in our study said that they take different measures for boys and girls when it comes to protecting them online. An apparent gender bias finds girls more protected than boys, yet it is boys who encounter more issues online.

Keeping tabs of a child’s safety online takes many forms, some involving apps and software on a child’s device, others that require parents to take a more active hand.

As for safety on devices, parental controls software provides one method for monitoring online activity, with features that keep an eye on children’s activity, limit screen time, and that block and filter certain apps and websites.

Parental controls software appears to remain a popular option. On PCs and laptops, 33% of parents reported using it. On mobile devices, the figure held at 33% as well.

Further, parents said that they relied on other approaches to help keep their children safe, citing several other ways they oversee their children’s time online. For example, in the case of monitoring activity on their child’s mobile device, parents say they will:

  • Limit the time of day or length of time when the child has screen time, 59%.
  • Check the websites or apps the child visits or uses, 56%.
  • Look at call records or text messages on a smartphone the child uses, 40%.
  • Friend or follow the child on social media sites, 35%.
  • Track the child’s location through GPS apps or software, 30%.

However, accounting for age and gender, differences in the use of parental controls arise. Girls in their tweens and early teens see more protection from parental controls software than boys do.

For example, girls 10-14 were more likely than boys of the same age to have parental controls on PCs on laptops in every country surveyed (except Canada), and on mobile in every country (except Germany).

This trend extends to several of the more hands-on approaches, with girls seeing them applied more often than boys. For example, in the U.S.:

  • 47% of parents say they will check the browsing and email history on the PCs of their daughters aged 10 to 14. For boys of the same age, that figure is far lower at 33%.
  • The numbers for mobile devices were also similar, with reported checks for girls at 48% and for boys at 35%.

Based on reports from boys, they are more likely to experience a range of online threats more frequently than girls do—with issues ranging from attempted account theft, a financial information leak, and unauthorized use of their personal data.

Meanwhile, it is girls who are adopting online activities at a rate much faster than boys, at least on mobile. Girls aged 10 to 14 tend to stream music, use social media, and go online shopping more than boys their age.

In all, girls report that they are reaping the benefits of online life earlier than boys and with relatively fewer security issues. Meanwhile, for boys, that equation is flipped. Their online lives mature more slowly, yet they find themselves experiencing security issues more often.

Further findings

We’ve seen just how young children are when they reach maturity, at least in terms of their lives online.
By their mid-teens, they’re using computers, laptops, and smartphones at rates that will carry into adulthood. With that, they’re already experiencing some of the risks and issues that adults do, such as attempted account theft, improper use of data, and leaks of financial information.

These represent a few of the many insights and trends found in our complete report on connected families. Others include noteworthy differences across nations, such as which nations report the highest levels of cyberbullying and which nation has nearly 100% of its young children saying they use a smartphone regularly. Yet more findings reveal insights into screen time, video game usage, and a breakdown of the top online activities for teens—and many more ways families are growing up together through their lives online.

Click here for a full copy of the report.

Survey Methodology

In December 2021 McAfee LLC conducted a study about beliefs and behaviors around digital participation and online protection among members of connected families—as individuals and as a family unit.

Global survey of parents and children, with children answering alongside their parents.

Parents and children were surveyed together, with parents answering first and then bringing their children in to consent and answer.
These findings represent connected families not collections of individuals.

The post Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study appeared first on McAfee Blog.

PlainID Debuts Authorization-as-a-Service Platform

Platform powered by policy-based access control (PBAC).
  • May 11th 2022 at 21:18

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes

By Jeffrey Schwartz, Contributing Writer
The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.

  • May 11th 2022 at 20:14

Ready, IAM, Fire: How Weak IAM Makes You a Target

Proper identity and access management configuration serves as an effective starting point for organizations looking to secure their cloud infrastructure.
  • May 11th 2022 at 20:05

Microsoft Simplifies Security Patching Process for Exchange Server

By Dark Reading Staff, Dark Reading
Delivering hotfixes and system updates separately will allow manual patching without requiring elevated permissions, Microsoft said.

  • May 11th 2022 at 18:50

Orca Security Unveils Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier

Enterprises can now ship more secure code to production by unifying security across software development, DevOps, and security teams.
  • May 11th 2022 at 18:29

NSA Warns Managed Service Providers Are Now Prime Targets for Cyberattacks

By Dark Reading Staff, Dark Reading
International cybersecurity authorities issue guidance to help information and communications service providers secure their networks.

  • May 11th 2022 at 17:28

Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete)

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).
  • May 11th 2022 at 17:27

Top 6 Security Threats Targeting Remote Workers

By Sakshi Udavant, Freelance Writer
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.

  • May 11th 2022 at 17:13

Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data

Round of $14.5M to support team of AI experts and cybersecurity leaders targeting overshared data with AI-based solutions for data access governance and loss prevention.
  • May 11th 2022 at 17:06

Breaking Down the Strengthening American Cybersecurity Act

By Charles Horton, Chief Operating Officer, NetSPI
New federal cybersecurity rules will set timelines for critical infrastructure sector organizations — those in chemical, manufacturing, healthcare, defense contracting, energy, financial, nuclear, or transportation — to report ransomware payments and cyberattacks to CISA. All parties have to comply for it to work and help protect assets.

  • May 11th 2022 at 17:00

Quantum Ransomware Strikes Quickly, How to Prepare and Recover

NYC-area cybersecurity expert shares the anatomy of a Quantum Ransomware attack and how to prevent, detect and recover from a ransomware attack, in a new article from eMazzanti Technologies.
  • May 11th 2022 at 16:54

Material Security Reaches $1.1 Billion Valuation for ‘Zero Trust’ Security on Microsoft and Google Email

Founders Fund leads $100 million Series-C financing, gaining the email security startup unicorn status two years after its launch.
  • May 11th 2022 at 16:09

SpyCloud Report: Fortune 1000 Employees Pose Elevated Cyber Risk to Companies

Analysis finds 687 million exposed credentials and personally identifiable information (PII) among Fortune 1000 employees, and a 64% password reuse rate.
  • May 11th 2022 at 15:42

Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers

By Jai Vijayan, Contributing Writer, Dark Reading
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.

  • May 11th 2022 at 14:30

The Danger of Online Data Brokers

By Dr. Chris Pierson, Founder & CEO, BlackCloak
Enterprises should consider online data brokers as part of their risk exposure analysis if they don't already do so.

  • May 11th 2022 at 14:00

Vanity URLs Could Be Spoofed for Social Engineering Attacks

By Robert Lemos, Contributing Writer, Dark Reading
Attackers could abuse the vanity subdomains of popular cloud services such as Box.com, Google, and Zoom to mask attacks in phishing campaigns.

  • May 11th 2022 at 13:00

Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails

By Dark Reading Staff, Dark Reading
Malicious emails with macro-enabled Word documents are spreading a never-before-seen remote-access Trojan, researchers say.

  • May 11th 2022 at 10:17

What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers

By Tara Seals, Managing Editor, News, Dark Reading
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.

  • May 10th 2022 at 22:35

US Pledges to Help Ukraine Keep the Internet and Lights On

By Dark Reading Staff, Dark Reading
US State Department outlines coordinated government effort to provide Ukraine with cybersecurity intelligence, expertise, and resources amid invasion.

  • May 10th 2022 at 21:37

Lincoln College Set to Close After Crippling Cyberattack

By Dark Reading Staff, Dark Reading
COVID-19 and a December 2021 cyberattack combined to put the future of Abraham Lincoln's namesake college in peril.

  • May 10th 2022 at 17:48

Colonial Pipeline facing $1,000,000 fine for poor recovery plans

By Paul Ducklin
How good is your cybersecurity? Are you making the same mistakes as lots of other people? Here's some real-life advice...

Cybercriminals Are Increasingly Exploiting Vulnerabilities in Windows Print Spooler

Kaspersky researchers discovered that cybercriminals made approximately 65,000 attacks between July 2021 and April 2022.
  • May 10th 2022 at 16:21

Arctic Wolf Launches Arctic Wolf Labs Focused on Security Operations Research and Intelligence Reporting

New research-focused division focused on advancing innovation in the field of security operations.
  • May 10th 2022 at 15:41

5-Buck DCRat Malware Foretells a Worrying Cyber Future

By Robert Lemos, Contributing Writer, Dark Reading
The Dark Crystal remote access Trojan (aka DCRat) breaks a few stereotypes, with coding done by a solo developer, using an obscure Web language and offering it at a frighteningly low price.

  • May 10th 2022 at 15:37

Onapsis Announces New Offering to Jumpstart Security for SAP Customers

Company delivers new vulnerability management offering to help resource-constrained organizations combat increasing attacks on mission-critical SAP applications .
  • May 10th 2022 at 15:36

Mastering the New CISO Playbook

By Chaim Mazal, Senior VP of Technology and CISO, Kandji
How can you safeguard your organization amid global conflict and uncertainty?

  • May 10th 2022 at 14:00

How to Check If Your F5 BIG-IP Device Is Vulnerable

By Dark Reading Staff, Dark Reading
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.

  • May 9th 2022 at 23:35

Joker, Other Fleeceware Surges Back Into Google Play

By Jai Vijayan, Contributing Writer, Dark Reading
The infamous Joker threat is back in Google Play, along with other Trojanized mobile apps that secretly sign Android users up for paid subscription services.

  • May 9th 2022 at 22:19

Costa Rica Declares State of Emergency Under Sustained Conti Cyberattacks

By Dark Reading Staff, Dark Reading
Conti's ransomware attack cripples Costa Rica's Treasury, sparking the US to offer a $15M bounty on the group.

  • May 9th 2022 at 21:09

5 Tips to Protect Your Career Against a Narcissist

By Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
When you find yourself the target of a narcissist, familiarize yourself with their tactics and learn how to survive.

  • May 9th 2022 at 20:00

NFTs Emerge as the Next Enterprise Attack Vector

By Jai Vijayan, Contributing Writer, Dark Reading
Cybersecurity has to be a top priority as enterprises begin incorporating the use of nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, experts say.

  • May 9th 2022 at 19:04

Deloitte Launches Expanded Cloud Security Management Platform

The CSM by Deloitte platform includes cloud security policy orchestration, cyber predictive analytics, attack surface management, and cyber cloud managed services.
  • May 9th 2022 at 17:27

RubyGems supply chain rip-and-replace bug fixed – check your logs!

By Paul Ducklin
Imagine if you could assume the identity of, say, Franklin Delano Roosevelt simply by showing up and calling yourself "Frank".

ruby-1200

Security Stuff Happens: Where Do You Go From Here?

By Tyler Farrar, CISO, Exabeam
Despite what it may feel like when you're in the trenches after a security incident, the world doesn't stop moving. (Part 3 of a series.)

  • May 9th 2022 at 14:00

Post-Quantum Cryptography Set to Replace RSA, ECC

By Dark Reading Staff, Dark Reading
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.

  • May 6th 2022 at 21:10

Ikea Canada Breach Exposes 95K Customer Records

By Dark Reading Staff, Dark Reading
An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.

  • May 6th 2022 at 19:42

What We've Learned in the 12 Months Since the Colonial Pipeline Attack

By Sue Poremba, Contributing Writer
The attack may have been "a major wake-up call" about the need for greater resilience in IT environments, but have security teams hit the snooze bar one too many times?

  • May 6th 2022 at 19:27

Scammer Infects His Own Machine With Spyware, Reveals True Identity

By Jai Vijayan, Contributing Writer, Dark Reading
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla.

  • May 6th 2022 at 19:25

White House Moves to Shore Up US Post-Quantum Cryptography Posture

By Dark Reading Staff, Dark Reading
Biden's executive order pushes new NIST quantum-cryptography standards and directs federal government to move toward quantum-resistant cybersecurity.

  • May 6th 2022 at 18:32

AT&T Expands Access to Advanced Secure Edge and Remote Workforce Capabilities

AT&T SASE with Cisco Meraki offers fully integrated network and security tools for convenient, high-performing, and protected access from anywhere
  • May 6th 2022 at 17:39

You didn’t leave enough space between ROSE and AND, and AND and CROWN

By Paul Ducklin
What weird Google Docs bug connects the words THEREFORE, AND, SECONDLY, WHY, BUT and BESIDES?

Passwords: Do Actions Speak Louder Than Words?

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
For most of us, passwords are the most visible security control we deal with on a regular basis, but we are not very good at it.

  • May 6th 2022 at 14:46

Colonial Pipeline 1 Year Later: What Has Yet to Change?

By Mariano Nunez, CEO & Co-Founder, Onapsis
The incident was a devastating attack, but it exposed gaps in cybersecurity postures that otherwise would have gone unnoticed.

  • May 6th 2022 at 14:00

Microsoft, Apple, and Google Promise to Expand Passwordless Features

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.

  • May 5th 2022 at 22:08

Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials

By Jai Vijayan, Contributing Writer, Dark Reading
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.

  • May 5th 2022 at 21:21

Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency

By McAfee Labs

By Oliver Devane 

Editors note: In the past 24 hours (from time of publication)  McAfee has identified 15 more scam sites bringing the total to 26. The combined value of the wallets shared on these sites is over $1,300,000 which is an increase of roughly $1,000,000 since this blog was last published. This highlights the scale of this current scam campaign. The table within this blog has been updated to include the new sites and crypto-wallets.

McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called ‘The B Word’ where Elon Musk, Cathie Wood, and Jack Dorsey discuss various aspects of cryptocurrency.  

The modified live streams make the original video smaller and put a frame around it advertising malicious sites that it claims will double the amount of cryptocurrency you send them. As the topic of the video is on cryptocurrency it adds some legitimacy to the websites being advertised.  

The original video is shown below on the left and a modified one which includes a reference to a scam site is shown on the right.  

 

 

We identified several different streams occurring at a similar same time. The images of some are shown below: 

 

The YouTube streams advertised several sites which shared a similar theme. They claim to send cryptocurrency worth double the value which they’ve received. For example, if you send 1BTC you will receive 2BTC in return. One of the sites frequently asked questions (FAQ) is shown below: 

Here are some more examples of the scam sites we discovered: 

The sites attempt to trick the visitors into thinking that others are sending cryptocurrency to it by showing a table with recent transactions. This is fake and is generated by JavaScript which creates random crypto wallets and amounts and then adds these to the table. 

The wallets associated with the malicious sites have received a large number of transactions with a combined value of $280,000 as of 5 PM UTC on the 5th of May 2022 

Scam Site  Crypto Type  Wallet  Value as on 5PM UTC 5th May 2022 
22ark-invest[.]org  ETH  0x820a78D8e0518fcE090A9D16297924dB7941FD4f  $25,726.46 
22ark-invest[.]org  BTC  1Q3r1TzwCwQbd1dZzVM9mdFKPALFNmt2WE  $29,863.78 
2xEther[.]com  ETH  0x5081d1eC9a1624711061C75dB9438f207823E694  $2,748.50 
2x-musk[.]net  ETH  0x18E860308309f2Ab23b5ab861087cBd0b65d250A  $10,409.13 
2x-musk[.]net  BTC  17XfgcHCfpyYMFdtAWYX2QcksA77GnbHN9  $4,779.47 
arkinvest22[.]net  ETH  0x2605dF183743587594A3DBC5D99F12BB4F19ac74  $11,810.57 
arkinvest22[.]net  BTC  1GLRZZHK2fRrywVUEF83UkqafNV3GnBLha  $5,976.80 
doublecrypto22[.]com  ETH  0x12357A8e2e6B36dd6D98A2aed874D39c960eC174  $0.00 
doublecrypto22[.]com  BTC  1NKajgogVrRYQjJEQY2BcvZmGn4bXyEqdY  $0.00 
elonnew[.]com  ETH  0xAC9275b867DAb0650432429c73509A9d156922Dd  $0.00 
elonnew[.]com  BTC  1DU2H3dWXbUA9mKWuZjbqqHuGfed7JyqXu  $0.00 
elontoday[.]org  ETH  0xBD73d147970BcbccdDe3Dd9340827b679e70d9d4  $18,442.96 
elontoday[.]org  BTC  bc1qas66cgckep3lrkdrav7gy8xvn7cg4fh4d7gmw5  $0.00 
Teslabtc22[.]com  ETH  0x9B857C44C500eAf7fAfE9ed1af31523d84CB5bB0  $27,386.69 
Teslabtc22[.]com  BTC  18wJeJiu4MxDT2Ts8XJS665vsstiSv6CNK  $17,609.62 
tesla-eth[.]org  ETH  0x436F1f89c00f546bFEf42F8C8d964f1206140c64  $5,841.84 
tesla-eth[.]org  BTC  1CHRtrHVB74y8Za39X16qxPGZQ12JHG6TW  $132.22 
teslaswell[.]com  ETH  0x7007Fa3e7dB99686D337C87982a07Baf165a3C1D  $9.43 
teslaswell[.]com  BTC  bc1qdjma5kjqlf7l6fcug097s9mgukelmtdf6nm20v  $0.00 
twittergive[.]net  ETH  0xB8e257C18BbEC93A596438171e7E1E77d18671E5  $25,918.90 
twittergive[.]net  BTC  1EX3dG9GUNVxoz6yiPqqoYMQw6SwQUpa4T  $99,123.42 

Scammers have been using social media sites such as Twitter and Youtube to attempt to trick users into parting ways with their cryptocurrency for the past few years. McAfee urges its customers to be vigilant and if something sounds too good to be true then it is most likely not legitimate.  

Our customers are protected against the malicious sites detailed in this blog as they are blocked with McAfee Web Advisor  

Type  Value  Product  Blocked 
URL – Crypto Scam  twittergive[.]net  McAfee WebAdvisor  YES 
URL – Crypto Scam  tesla-eth[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  22ark-invest[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  2xEther[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  Teslabtc22[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  elontoday[.]org  McAfee WebAdvisor  YES 
URL – Crypto Scam  elonnew[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  teslaswell[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  2x-musk[.]net  McAfee WebAdvisor  YES 
URL – Crypto Scam  doublecrypto22[.]com  McAfee WebAdvisor  YES 
URL – Crypto Scam  arkinvest22[.]net  McAfee WebAdvisor  YES 

 

The post Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency appeared first on McAfee Blog.

NIST Issues Guidance for Addressing Software Supply-Chain Risk

By Dark Reading Staff, Dark Reading
Amid ongoing software supply-chain jitters, the US' top tech division is offering a finalized, comprehensive cybersecurity control framework for managing risk.

  • May 5th 2022 at 19:39

A Third of Americans Use Easy-to-Guess Pet Passwords

By Dark Reading Staff, Dark Reading
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.

  • May 5th 2022 at 19:27

Critical Cisco VM-Escape Bug Threatens Host Takeover

By Tara Seals, Managing Editor, News, Dark Reading
The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.

  • May 5th 2022 at 18:31

FBI: Bank Losses From BEC Attacks Top $43B

By Dark Reading Staff, Dark Reading
Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.

  • May 5th 2022 at 18:03

Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies

The company will continue the development of Comae’s memory analysis platform and seek to incorporate its capabilities into existing solutions
  • May 5th 2022 at 17:28

Cisco Announces Cloud Controls Framework Is Now Available to Public

The Cisco CCF helps save resources by enabling organizations to achieve cloud security certifications more efficiently.
  • May 5th 2022 at 16:48
❌