{"id":19297,"date":"2016-06-10T13:01:11","date_gmt":"2016-06-10T19:01:11","guid":{"rendered":"https://www.webroot.com/blog/?p=19297"},"modified":"2019-09-30T10:12:40","modified_gmt":"2019-09-30T16:12:40","slug":"threat-recap-week-june-6th","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/06\/10\/threat-recap-week-june-6th\/","title":{"rendered":"Threat Recap: Week of June 6th"},"content":{"rendered":"\n<p>There\u2019s a lot that&nbsp;happens in the security world, with&nbsp;many stories getting lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week.<\/p>\n\n\n\n<p><strong>Human Error Remains Top Security Threat<\/strong><\/p>\n\n\n\n<p>In a study conducted over the course of 3 years by the Information Commissioner&#8217;s Office, it was found that security breaches due to human error were the number one issue, with the\u00a0number of reported issues growing steadily year-over-year. While many companies have been increasing the amount of security precautions in regards to cyber attacks, most of them do not see human error as the real problem and thus provide no additional cybersecurity <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/security-awareness\">training for their employees<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-charity-digital-news\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"FZJfVR8UYM\"><a href=\"https:\/\/www.charitydigitalnews.co.uk\/2016\/06\/03\/human-error-more-damagaing-than-cyber-attacks\/\">Human error more damaging than cyber attacks<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.charitydigitalnews.co.uk\/2016\/06\/03\/human-error-more-damagaing-than-cyber-attacks\/embed\/#?secret=FZJfVR8UYM\" data-secret=\"FZJfVR8UYM\" width=\"600\" height=\"338\" title=\"&#8220;Human error more damaging than cyber attacks&#8221; &#8212; Charity Digital News\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>University of Calgary Pays High-Dollar Ransom<\/strong><\/p>\n\n\n\n<p>In the past week, the University of Calgary was hit with a ransomware attack that left them with few options. In the end, they ended up paying the nearly $20,000 ransom in hopes of regaining their important files&nbsp;and keeping their systems functional. Fortunately for students and faculty, the decryption keys have been successful, but&nbsp;there still remains&nbsp;much left to do to protect against future attacks.<\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-help-net-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Wa1Zey2KWW\"><a href=\"https:\/\/www.helpnetsecurity.com\/2016\/06\/08\/university-pays-20000-ransomware\/\">University pays $20,000 in ransomware attack<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.helpnetsecurity.com\/2016\/06\/08\/university-pays-20000-ransomware\/embed\/#?secret=Wa1Zey2KWW\" data-secret=\"Wa1Zey2KWW\" width=\"600\" height=\"338\" title=\"&#8220;University pays $20,000 in ransomware attack&#8221; &#8212; Help Net Security\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Social Media Hacks&nbsp;On The Rise<\/strong><\/p>\n\n\n\n<p>Recently, many high-profile Twitter&nbsp;and other social media accounts have been hacked, including the official NFL Twitter&nbsp;account and Mark Zuckerberg&#8217;s seemingly unused account. The hacker behind the NFL breach claims to have had access to an NFL Social Media Staffer&#8217;s email that contained the login information for the @NFL &nbsp;account, although it&#8217;s unclear exactly how that access was gained.<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttp:\/\/arstechnica.com\/security\/2016\/06\/nfls-breached-twitter-account-falsely-claims-commissioner-goodell-is-dead\/\n<\/div><\/figure>\n\n\n\n<p><strong>Game Torrents Redirecting to PUA Downloads<\/strong><\/p>\n\n\n\n<p>Many people who download pirated copies of games are aware of the risks involved, as some of these downloads have the possibility to contain malicious software. However, a current trend across torrent sites is instead to bundle&nbsp;potential unwanted applications (PUAs) with legitimate game titles and have the file launch an executable rather than the zipped game files. Once the user allows the download, some variants are capable of silently downloading additional PUAs onto the machine without further&nbsp;notifications to the user.<\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-help-net-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"xCrgppO1Im\"><a href=\"https:\/\/www.helpnetsecurity.com\/2016\/06\/08\/fake-gaming-torrents\/\">Fake gaming torrents download unwanted apps instead of popular games<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.helpnetsecurity.com\/2016\/06\/08\/fake-gaming-torrents\/embed\/#?secret=xCrgppO1Im\" data-secret=\"xCrgppO1Im\" width=\"600\" height=\"338\" title=\"&#8220;Fake gaming torrents download unwanted apps instead of popular games&#8221; &#8212; Help Net Security\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Microsoft&#8217;s Anti-Macro Efforts Missing Target<\/strong><\/p>\n\n\n\n<p>With macro-based infections continuously on the rise, Microsoft has made an attempt to secure its users through the use of more messaging, which warns of macros launching out of Word or Excel documents. Unfortunately, the wording of these warnings has changed for the worse since early iterations of the Office Suite. Where once the messages warned users of possible malicious content and aimed them away from enabling the macro, they now show an almost cheerful dialog box with options only to enable the macro or ignore the bright yellow bar atop the screen.<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttp:\/\/www.cso.com.au\/article\/601455\/microsoft-office-macro-malware-warnings-failed-users\/\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a lot that&nbsp;happens in the security world, with&nbsp;many stories getting lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Human Error Remains Top Security Threat In a study conducted over the course of 3 [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":18385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3673,5595,3565,25045,8693,4379,19887,19883,3557,4723,19889,3567,18563,3479,3699,4701,19181,3569,5417,19885],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19297"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19297"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19297\/revisions"}],"predecessor-version":[{"id":29253,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19297\/revisions\/29253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18385"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19297"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19297"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}