{"id":28921,"date":"2019-08-16T08:52:54","date_gmt":"2019-08-16T14:52:54","guid":{"rendered":"https://www.webroot.com/blog/?p=28921"},"modified":"2019-08-16T08:52:55","modified_gmt":"2019-08-16T14:52:55","slug":"cyber-news-rundown-hookup-app-exposes-users","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/08\/16\/cyber-news-rundown-hookup-app-exposes-users\/","title":{"rendered":"Cyber News Rundown: Hookup App Exposes Users"},"content":{"rendered":"\n<h2>Hookup App Leaks User Locations<\/h2>\n\n\n\n<p>Geo-locating and other sensitive data has been leaked from the\nhookup app <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/security-experts-slam-group-hookup\/\">3fun<\/a>,\nexposing the information for more than 1.5 million users. While some dating\napps using trilateration to find nearby users, 3fun showed location data capable\nof tracing a user to a specific building or floor. Though users had the option\nto disable coordinate tracking, that data was nevertheless stored and available\nthrough the app\u2019s API. 3fun has since resolved the leak and has hopefully\nimplemented stronger security measures considering the private nature of their\nclient\u2019s activities. <\/p>\n\n\n\n<h2>Ransomware Attacks on DSLR Cameras<\/h2>\n\n\n\n<p>Malware authors continue to find new victims, as a ransomware\nvariant has been found to be remotely attacking <a href=\"https:\/\/thehackernews.com\/2019\/08\/dslr-camera-hacking.html\">Canon DSLR\ncameras<\/a> and demanding a ransom to regain access to the device. Researchers\nhave found multiple vulnerabilities that could allow attackers to perform any\nnumber of critical functions on the cameras, including displaying a ransom note\nand remotely taking pictures with the camera. Fortunately, Canon has already\nbegun issuing patches for some of its affected devices, though it\u2019s taking\nlonger to fully secure others. <\/p>\n\n\n\n<p style=\"text-align:center\"><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/vpn-wifi-security\"><strong>Take back your privacy. Learn more about the benefits of a VPN.<\/strong><\/a><\/p>\n\n\n\n<h2>Google Drive Exploit Allows Phishing Campaign to Flourish<\/h2>\n\n\n\n<p>A new phishing campaign has been discovered that uses a\nlegitimate <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-campaign-uses-google-drive-to-bypass-email-gateways\/\">Google\nDrive<\/a> account to launch a phishing campaign\nthat impersonates the CEO asking the victim to open the Google Docs file and\nnavigate to the phishing site\u2019s landing page. Luckily for victims, the campaign\nhas a few tells. The phony CEO email address uses a non-conforming naming\nconvention and the email itself appears to be a hastily compiled template. <\/p>\n\n\n\n<h2>British Airways Data Leak<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ba-under-fire-for-leaking\/\">British\nAirways<\/a> has again come under scrutiny, this time after it was discovered\nthat their e-ticketing system was leaking sensitive passenger data. The leak stems\nfrom flight check-in links that were sent out to customers containing both\ntheir surname and booking confirmation numbers completely unencrypted within\nthe URL. Even more worrisome, this type of vulnerability has been well-known\nsince last February when several other airlines were found to have the same\nissue by the same security firm. <\/p>\n\n\n\n<h2>Android Trojan Adds New Functionality<\/h2>\n\n\n\n<p>Following in the footsteps of Anubis, an Android banking Trojan\nfor which source code was recently revealed, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-cerberus-android-banker-uses-pedometer-to-avoid-analysis\/\">Cerberus<\/a>\nhas quickly filled the void without actually borrowing much of that code. One\nmajor change is that Cerberus implemented a new method of checking if the\ndevice is physically moving or not, in hopes of avoiding detection by both the\nvictim and any researchers who may be analyzing it. Additionally, this variant uses\nphishing overlays from several popular sites to further collect any login\ncredentials or payment card data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hookup App Leaks User Locations Geo-locating and other sensitive data has been leaked from the hookup app 3fun, exposing the information for more than 1.5 million users. While some dating apps using trilateration to find nearby users, 3fun showed location data capable of tracing a user to a specific building or floor. Though users had [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":28923,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21936,21940,21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28921"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=28921"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28921\/revisions"}],"predecessor-version":[{"id":28933,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28921\/revisions\/28933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/28923"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=28921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=28921"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=28921"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=28921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}