{"id":22035,"date":"2017-08-11T06:30:49","date_gmt":"2017-08-11T12:30:49","guid":{"rendered":"https://www.webroot.com/blog/?p=22035"},"modified":"2023-10-10T08:20:59","modified_gmt":"2023-10-10T14:20:59","slug":"cyber-news-rundown-edition-81117","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/08\/11\/cyber-news-rundown-edition-81117\/","title":{"rendered":"Cyber News Rundown: Edition 8\/11\/17"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.<\/p>\n<h2>Solar Panel Vulnerabilities Could Lead to Hot Issues<\/h2>\n<p>A recent study on several of the top solar panel manufacturers checked for any exploitable vulnerabilities in their products. One outcome of the study found that if a large volume of solar panels were exploited at once, it could <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cyber-attack-on-solar-panels-could-shut-down-power-grids-via-domino-effect\/\">cause catastrophic problems for the main power grid<\/a> of an entire country. If such an attack took place, it\u2019s very possible millions of people would be in for a hot mess.<\/p>\n<h2>Ships\u2019 Technology Returning to Familiar Shores<\/h2>\n<p>In the past few years, sea-faring ships have been enhancing their GPS capabilities to keep track of their fleet anywhere in the world. Unfortunately, this technology is also quite vulnerable to cyberattacks, which could <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/08\/07\/cyberattacks-on-gps-leave-ships-sailing-in-dangerous-waters\/\">land a ship in troubled waters<\/a>\u2014stranded hundreds of miles from shore. As these attacks increase, many shipping companies are turning back to older radios as backups to keep in touch with each other and associates on land.<\/p>\n<h2>Dutch Car Leasing Company Leaks Driver Info<\/h2>\n<p>Within the last week, researchers have <a href=\"http:\/\/nltimes.nl\/2017\/08\/07\/data-100000-dutch-lease-drivers-leaked\">discovered a vulnerability in LeaseWise<\/a>, a type of software used by dozens of car leasing companies. While the leak was shut down after only 24 hours, officials have stated that nearly 100,000 customers\u2019 data may have been exposed in the data breach.<\/p>\n<h2>iOS Users are Twice as Likely to get Phished<\/h2>\n<p>Over the past few months, researchers have been compiling the statistics for mobile device attacks on iOS\u00ae and Android\u2122 phones. Although many users still consider Apple and iOS products to be invulnerable to attacks, the numbers showed nearly twice as many phishing attacks against iOS devices over their Android counterparts. Even more concerning: the majority of these phishing attacks are taking place outside of email services, where they can get around the usual spam filters and other security measures.<\/p>\n<h2>Blizzard Players Left Cold During Summer Games 2017<\/h2>\n<p>On August 9, players of the widely-popular Blizzard game, Overwatch, have been <a href=\"https:\/\/www.hackread.com\/overwatch-blizzard-servers-suffer-outage\/\">stuck staring at login screen issues with no resolution in sight<\/a>. As the Summer Games 2017 event kicked off, a large number of Blizzard servers went down, leaving hundreds of players worldwide (understandably) annoyed and demanding answers. Unfortunately, Blizzard has yet to resolve the issue, but is keeping users apprised of their progress toward a resolution on the company Twitter page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask. Solar Panel Vulnerabilities Could Lead to Hot Issues A recent study on several of the top [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":21943,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5043,3565,6667,21311,4971,4959,21315,3519,4801,4135,3543,4967,3479,21317,21309,21313,21307,3529,9065],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22035"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=22035"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22035\/revisions"}],"predecessor-version":[{"id":32079,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22035\/revisions\/32079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/21943"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=22035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=22035"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=22035"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=22035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}