{"id":20599,"date":"2016-12-30T07:00:42","date_gmt":"2016-12-30T14:00:42","guid":{"rendered":"https://www.webroot.com/blog/?p=20599"},"modified":"2018-01-30T10:27:34","modified_gmt":"2018-01-30T17:27:34","slug":"cyber-news-rundown-edition-123016","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/12\/30\/cyber-news-rundown-edition-123016\/","title":{"rendered":"Cyber News Rundown: Edition 12\/30\/16"},"content":{"rendered":"<h5>Ransomware \u201cStar\u201d Shines on LG Smart TV<\/h5>\n<p>As ransomware continues to steal the malware stage, its authors have widened their target audience to include <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-ransomware-infects-lg-smart-tv\/\">smart devices<\/a>, such as TVs. Since a number of smart TVs use Android\u00ae operating systems, they can be susceptible to the same Android malware that usually strikes mobile devices. Recently, owners of an older LG TV model were presented with a ransomware lock screen after installing a third-party streaming app for movies. The good news for current customers, however, is that many TV manufacturers have taken steps to help prevent these types of attacks by adopting a Linux-based OS.<\/p>\n<h5>Facebook Vulnerability May Reveal Private Email Addresses<\/h5>\n<p>Bug bounty programs are rewards that many websites offer to encourage \u201cwhite hat\u201d individuals to report bugs, exploits, and vulnerabilities in their code. They\u2019ve been around for years, and can offer big money to people who can successfully verify a vulnerability in a website or application. One such payout occurred recently when a researcher found <a href=\"https:\/\/threatpost.com\/clever-facebook-hack-reveals-private-email-address-of-any-user\/122723\/\">a Facebook bug<\/a> that let him access the private email addresses of any user through the Facebook Group notification function. After sending group invitations, he noticed the page URL showed the recipient\u2019s email address in plain text. Fortunately, thanks to this intrepid bounty hunter, the vulnerability has been addressed.<\/p>\n<h5>Ransomworm: The Newest Contender in the Ransomware Ring<\/h5>\n<p>A good cybercriminal\u2014that is, one who is good at their trade\u2014is always on the lookout for the latest ways to exploit internet usage habits and vulnerabilities. According to researchers on the subject, the next evolution of highly lucrative ransomware campaigns will likely <a href=\"http:\/\/www.csoonline.com\/article\/3151964\/data-breach\/ransomworm-the-next-level-of-cybersecurity-nastiness.html?utm_source=dlvr.it&amp;utm_medium=twitter#tk.rss_all\">incorporate network worm capabilities<\/a>. By adding the functionality of a network worm, ransomware could more easily spread across entire networks, causing exponentially more devastation to its victims. While early variants of a Ransomworm have already been seen in the form of USB propagating infector ZCryptor, it won\u2019t be long before we see wider spread variants in the wild.<\/p>\n<h5>Airline Booking Systems Rival TSA for Worst Security Nightmare<\/h5>\n<p>\u201cBooking travel.\u201d That\u2019s all I had to say before you groaned, right? Planning a trip already has the potential to be extremely stressful. A lot of the frustration is (at least partially) due to <a href=\"https:\/\/srlabs.de\/bites\/travel-hacking\/\">ancient systems<\/a> that have been in place across the world for decades; and, although they facilitate various necessities for air travel, they don\u2019t always do so quickly or efficiently. More importantly, because many of these systems are over 30 years old, they aren\u2019t up to today\u2019s security standards, and they can be insanely difficult to retrofit\u2014leaving customers\u2019 information vulnerable.<\/p>\n<h5>Music Pirate May Walk the Plank<\/h5>\n<p>You might think music piracy is sooo early 2000s, but P2P programs that allow users to &#8220;share&#8221; their music libraries are still alive and well, and authorities confirm that piracy is still thriving. Recently, a UK man was <a href=\"https:\/\/www.hackread.com\/man-jailed-for-uploading-uks-top-40-singles-on-tpb-kat\/\">arrested for distributing singles<\/a> from the country&#8217;s Top 40 list across multiple torrent sites and causing untold commercial loss to record companies and artists.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware \u201cStar\u201d Shines on LG Smart TV As ransomware continues to steal the malware stage, its authors have widened their target audience to include smart devices, such as TVs. Since a number of smart TVs use Android\u00ae operating systems, they can be susceptible to the same Android malware that usually strikes mobile devices. Recently, owners [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":20065,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4951,3517,3493,10141,4497,20333,3477,7375,20329,4801,5369,20327,20325,3937,5463,5003,20331,20335,3471,8925],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20599"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=20599"}],"version-history":[{"count":6,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20599\/revisions"}],"predecessor-version":[{"id":20837,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20599\/revisions\/20837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/20065"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=20599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=20599"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=20599"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=20599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}