{"id":23959,"date":"2018-01-05T09:25:10","date_gmt":"2018-01-05T16:25:10","guid":{"rendered":"http:\/\/blogdev.services.webroot\/?p=23959"},"modified":"2018-02-09T09:26:22","modified_gmt":"2018-02-09T16:26:22","slug":"cyber-news-rundown-edition-1-5-18","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/01\/05\/cyber-news-rundown-edition-1-5-18\/","title":{"rendered":"Cyber News Rundown: Edition 1\/5\/18"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst with a passion for all things security. Any questions? Just ask.<\/p>\n<h3>Researchers Find Major Security Flaws in Modern Processors<\/h3>\n<p>Newly discovered bugs, <a href=\"https:\/\/techcrunch.com\/2018\/01\/03\/kernel-panic-what-are-meltdown-and-spectre-the-bugs-affecting-nearly-every-computer-and-device\/\">Meltdown and Spectre<\/a>, exploit critical flaws in the architecture of many modern processors to leak system memory and view information that should remain hidden at the application level. This vulnerability would allow hackers to steal secret information, such as stored passwords, although there are no known exploits currently in use. <a class=\"inline-twitter-link inline-tweet-click\" href=\"#\" onclick=\"window.open('https:\/\/twitter.com\/intent\/tweet?url=https://www.webroot.com/blog/2018\/01\/05\/cyber-news-rundown-edition-1-5-18\/&amp;text=Operating system makers such as Microsoft, Apple, and Linux scrambled on Wednesday to release security updates to protect users.%E2%80%94via+%40Webroot','mywindow','location=1,status=1,scrollbars=1, width=700,height=500');\" title=\"Tweet This!\">Operating system makers such as Microsoft, Apple, and Linux scrambled on Wednesday to release security updates to protect users.<span class=\"dashicons dashicons-twitter dashicons-inline-tweet-sharer\"><\/span><\/a> Experts speculate these flaws will impact the security industry for many years to come.<\/p>\n<h3>\u2018Trackmageddon\u2019 Bugs Leave GPS Data Open to Hackers<\/h3>\n<p>Two security researches have uncovered several vulnerabilities that <a href=\"https:\/\/thehackernews.com\/2018\/01\/gps-location-tracking.html\">affect GPS tracking services<\/a>, including those used in child and pet trackers. These vulnerabilities range from weak passwords and unsecured folders to unprotected API endpoints, according a report <a href=\"https:\/\/0x0.li\/trackmageddon\/\">issued by the research team.<\/a> Hackers could potentially exploit these flaws to collect private data from these location-tracking services.<\/p>\n<h3>Clothing Retailer Finds Malware on PoS Devices<\/h3>\n<p>The LA-based fashion retailer Forever 21 revealed that a <a href=\"http:\/\/www.zdnet.com\/article\/forever-21-investigation-reveals-malware-present-at-some-stores\/\">recent data breach<\/a> resulted in the theft of customer credit card information. Following an investigation, <a class=\"inline-twitter-link inline-tweet-click\" href=\"#\" onclick=\"window.open('https:\/\/twitter.com\/intent\/tweet?url=https://www.webroot.com/blog/2018\/01\/05\/cyber-news-rundown-edition-1-5-18\/&amp;text=Forever 21 disclosed that point-of-sale devices were infected with malware following a lapse in data encryption.%E2%80%94via+%40Webroot','mywindow','location=1,status=1,scrollbars=1, width=700,height=500');\" title=\"Tweet This!\">Forever 21 disclosed that point-of-sale devices were infected with malware following a lapse in data encryption.<span class=\"dashicons dashicons-twitter dashicons-inline-tweet-sharer\"><\/span><\/a> While it\u2019s still unclear how many stores and customers have been affected, the retailer advises all customers to keep a close eye on their financial statements and credit reports for suspicious activity.<\/p>\n<h3>Cancer Care Provider Reaches Settlement over HIPAA Violations<\/h3>\n<p>21<sup>st<\/sup> Century Oncology has reached a $2.3 million settlement agreement with the US Department of Health and Human Services following a data breach that <a href=\"https:\/\/www.hhs.gov\/about\/news\/2017\/12\/28\/failure-to-protect-the-health-records-of-millions-of-persons-costs-entity-millions-of-dollars.html\">leaked\u00a0patient records<\/a> and Social Security numbers of some 2 million patients. According to a press release from HHS, the breach was uncovered after an FBI informant was able to illegally obtain the company\u2019s private patient files from a third party.<\/p>\n<h3>Android Malware Variant Steals Uber Data<\/h3>\n<p>Fakeapp malware found on Android devices <a href=\"https:\/\/www.irishtimes.com\/business\/technology\/new-android-hack-steals-uber-credentials-covers-its-tracks-1.3344923\">spoofs Uber app<\/a> to appear legitimate to users. This new malware tricks users into entering their account credentials by imitating the Uber app\u2019s user interface. This attack underscores the need for caution when downloading apps, even from the Google Play store, as well as using a trusted a mobile security solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst with a passion for all things security. Any questions? Just ask. Researchers Find Major Security Flaws in Modern Processors Newly discovered bugs, Meltdown and Spectre, exploit critical flaws in the architecture [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":23221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23959"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=23959"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23959\/revisions"}],"predecessor-version":[{"id":23961,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23959\/revisions\/23961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/23221"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=23959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=23959"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=23959"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=23959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}