EFF worries that the Google’s ‘privacy-first” vision for the future may pose new privacy risks.
This month Google begins a public test of a technology it says will eventually replace browser cookies in an effort to boost Chrome browser user privacy. However, critics say the switch is a half-measure and does not protect the web movements of Chrome users adequately.
The Google solution–called Federated Learning of Cohorts (FLoC) is promoted as a way to put people’s privacy first by limiting the capability of third parties to track their activity across the web using Cookies.
How Does Federated Learning of Cohorts Protect Privacy?
A primer on the proliferation of offensive cyber capabilities Issue Brief by Winnona DeSombre, Michele Campobasso, Dr. Luca Allodi, Dr. James Shires, JD Work, Robert Morgus, Patrick Howell O’Neill, and Dr. Trey Herr
Executive summary
Offensive cyber capabilities run the gamut from sophisticated, long-term disruptions of physical infrastructure to malware used to target human rights journalists. As these capabilities continue to proliferate with increasing complexity and to new types of actors, the imperative to slow and counter their spread only strengthens. But to confront this growing menace, practitioners and policy makers must understand the processes and incentives behind it. The issue of cyber capability proliferation has often been presented as attempted export controls on intrusion software, creating a singular emphasis on malware components. This primer reframes the narrative o
North Korean hacking group weaponized MS Word document in spear phishing attack
APT37 deployed malicious macros in a move that goes beyond a popular South Korean office suite, new report says
SHARE
Image: NK Pro
A hacking group linked to North Korea that focused on South Korean file formats in past attacks started weaponizing Microsoft Word documents, security firm Malwarebytes Labs warned in a report on Wednesday. The researchers identified a malicious macro in a Korean-language Word file purporting to be an invitation that was “likely used to target the government of South Korea,” the report said.
The security company attributed the spear-phishing attack to a group known as APT37, Reaper, ScarCruft or Group 123. The malicious code found in the lure document eventually downloads and installs the Remote Access Trojan RokRat, which
SamSam Ransomware 101: How It Works and How to Avoid It
SamSam Ransomware Was Released in Late 2015. Here’s What You Should Know About It.
LAST UPDATED ON DECEMBER 31, 2020
INTERMEDIATE READ
Malware traditionally spreads through nefarious social engineering practices, phishing campaigns, and malicious attachments. In this way, it manages to profit off of users that are not well-versed in matters of cybersecurity. SamSam ransomware takes a different approach, which is exactly what makes it so dangerous.
In this article, I will first go over what SamSam ransomware is, as well as how it works. As always, stay tuned until the end for some actionable advice on how to prevent a SamSam ransomware infection.