{"id":24249,"date":"2018-04-13T01:00:28","date_gmt":"2018-04-13T07:00:28","guid":{"rendered":"https://www.webroot.com/blog/?p=24249"},"modified":"2018-04-12T16:58:03","modified_gmt":"2018-04-12T22:58:03","slug":"cyber-news-rundown-4-13-18","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/04\/13\/cyber-news-rundown-4-13-18\/","title":{"rendered":"Cyber News Rundown: Hacktivists Strike YouTube Music Videos"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask.<\/p>\n<h2>Music-Oriented YouTube Channels Hacked<\/h2>\n<p>Within the last week, hackers have defaced multiple <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/vevo-suffers-music-video-hack\/\">YouTube music videos<\/a>, focusing largely on Vevo channels with high view counts. Most of the videos were quickly taken down after suspicious upload activity was found on several accounts, leaving some videos with the statement \u201cFree Palestine\u201d in the description. Vevo worked quickly to resolve the defacement and is in the process of returning the affected videos to viewable status.<\/p>\n<h2>Pen Test Reveals Security Risks for Radar<\/h2>\n<p>Researchers have recently been working to determine if radar is truly secure, as industry professionals have claimed, since it doesn\u2019t interact with the Internet. Unfortunately, after a bit of effort, these same researchers were able to <a href=\"http:\/\/www.marinemec.com\/news\/view,impregnable-radar-breached-in-simulated-cyber-attack_51353.htm\">successfully breach the core systems for radar<\/a> on a Navy vessel and modify it enough to set the ship off course without raising alarms. The system, had it been maliciously compromised, could have easily run the ship aground or sent off on a dangerous interception course. In addition to taking control of the vessel, the researchers were also able to remove all radar detections and leave the ship effectively blind in the water.<\/p>\n<h2>Majority of Android Users Denied Consent to Facebook over Data Collection<\/h2>\n<p>In a recent survey, nearly 90% of the 1,300 users had <a href=\"http:\/\/blog.teamblind.com\/index.php\/2018\/04\/09\/did-you-give-facebook-consent-to-collect-your-call-and-text-history-89-of-android-users-say-no\/\">refused consent<\/a> to Facebook for collecting SMS and call data. Unsurprisingly, Facebook has replied that the choice was an opt-in rather than out and users should have been asked, though many agree that no choice had ever been presented to them. Some users have even reported seeing over two years worth of call and SMS data saved within their Facebook account\u2019s data.<\/p>\n<h2>Facebook Announces Permissions Change<\/h2>\n<p>In the wake of the <a href=\"https:\/\/techcrunch.com\/2018\/04\/10\/facebook-begins-blocking-apps-from-accessing-user-data-after-90-days-of-non-use\/\">Cambridge Analytica fiasco<\/a>, Facebook has made multiple changes to its policy on app permissions that collect user data. Any app that hasn\u2019t been accessed within the last 90 days will require the user to go through the Facebook login page and re-consent to any data collection that may take place. These changes will not be immediate, but instead rolled out over a two-week period, giving users time to decide which apps they want to use and letting expired data tokens be deleted.<\/p>\n<h2>Department of the Interior Faces Malware Infection<\/h2>\n<p>Nearly three years after the data breach within the Office of Personnel Management, the Interior Department is still having issues with properly securing their systems. The latest <a href=\"https:\/\/federalnewsradio.com\/cybersecurity\/2018\/04\/ig-interior-dept-computer-infected-with-malware-after-employee-surfed-porn-sites\/\">internal threat<\/a> stems from a US Geological Survey employee who was found to be watching pornography and saving the videos to an external hard drive, which led to their computer hosting Russian malware. This likely ties back to the department relying on automated security systems, rather than having trained personnel actively monitoring for malicious activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Music-Oriented YouTube Channels Hacked Within the last week, hackers have defaced multiple YouTube music videos, focusing largely [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":24251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21943,21945],"yst_prominent_words":[21808,22081,22077,3769,18443,21417,4497,4469,4801,4649,4049,7771,3479,22079,5003,3569,3529,22083,7191,8271],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24249"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=24249"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24249\/revisions"}],"predecessor-version":[{"id":24255,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24249\/revisions\/24255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/24251"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=24249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=24249"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=24249"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=24249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}