{"id":78008,"date":"2014-03-08T15:53:28","date_gmt":"2014-03-08T10:23:28","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=78008"},"modified":"2014-03-08T15:53:28","modified_gmt":"2014-03-08T10:23:28","slug":"latest-it-security-news-and-updates-for-the-week-5","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/latest-it-security-news-and-updates-for-the-week-5\/","title":{"rendered":"Latest IT Security News and Updates for the Week"},"content":{"rendered":"<p>There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/FB+Wapp.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-78009\" alt=\"FB+Wapp\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/FB+Wapp.jpg\" width=\"475\" height=\"267\" \/><\/a><\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns<\/span><\/p>\n<p>If you have doubts about your private data being misused thanks to Facebook\u2019s mammoth acquisition of Whatsapp, you\u2019re not alone. Two watchdog groups based in the US have filed an FTC complaint against this deal. However, don\u2019t expect much to change due to that. It\u2019s time to accept that Facebook will now get access to your Whatsapp account and messages too. Read more about this story <a href=\"https:\/\/news.cnet.com\/8301-1009_3-57620026-83\/privacy-groups-ask-ftc-to-block-facebook-whatsapp-deal\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/cnet-hacker.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-78010\" alt=\"cnet hacker\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/cnet-hacker.jpg\" width=\"610\" height=\"409\" \/><\/a><\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">One single tweet is all it takes to launch a full-blown hack against an individual<\/span><\/p>\n<p>In the name of journalistic investigation, a CNET reporter decided to see how much information is really needed to hack someone\u2019s digital life. The answer surprised him and also led him to a moral dilemma about where to stop. Read the whole story <a href=\"https:\/\/news.cnet.com\/8301-1009_3-57620006-83\/privacy-at-peril-from-one-tweet-a-full-blown-hack\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/malware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-78011\" alt=\"malware\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/03\/malware.jpg\" width=\"475\" height=\"267\" \/><\/a><\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">An unlikely source of malware creation<\/span><\/p>\n<p>Where does malware originate from? This is a question that is becoming increasingly difficult to answer. But if you were to hazard a guess and say that malware is made by state level Governments, then you may not be entirely wrong. Bizarrely, the Russian Government has been accused of creating malware. Note that this is just an accusation and not proven yet. You can see the whole story <a href=\"https:\/\/news.cnet.com\/8301-1009_3-57619748-83\/security-firm-claims-russian-government-makes-malware\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">China\u2019s \u2018mobile underground\u2019 operates at rock bottom prices<\/span><\/p>\n<p>Creating mobile malware takes time and money. However, if a hacker were to visit China\u2019s mobile underground market, he could potentially acquire all the tools needed by him at dirt cheap prices. Read the whole story <a href=\"https:\/\/www.theregister.co.uk\/2014\/03\/04\/cyber_mobile_underground_china\/\" rel=\"nofollow\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px; color: #666666; font-family: verdana; font-weight: bold;\">Other news:<\/span><\/p>\n<p>#1 <a href=\"https:\/\/www.informationweek.com\/security\/attacks-and-breaches\/ddos-attack!-is-regulation-the-answer\/d\/d-id\/1114050?\" rel=\"nofollow\">Four security experts debate on how DDoS attacks can be combated by companies<\/a>.<\/p>\n<p>#2 <a href=\"https:\/\/www.informationweek.com\/mobile\/mobile-devices\/make-byod-work-9-key-considerations\/d\/d-id\/1114021?\" rel=\"nofollow\">Nine key things to consider while implementing a BYOD policy in your organization<\/a>.<\/p>\n<p>#3 <a href=\"https:\/\/mashable.com\/2014\/03\/05\/snowden-phone\/\" rel=\"nofollow\">The \u2018Snowden Phone\u2019 that encrypts and wipes out user data can be a gift or a curse<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at. Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns If you have doubts about your private data being misused thanks to Facebook\u2019s [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":78009,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[78,163,152,282,65,58,49,43,160,47,162,38],"class_list":["post-78008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-botnet","tag-cyber-crime","tag-cyberespionage","tag-facebook-2","tag-facebook-privacy","tag-hacking","tag-malware","tag-facebook-malware","tag-privacy","tag-security","tag-spam","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78008"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=78008"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78008\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=78008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=78008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=78008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}