<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security trends for 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 07:22:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Aurealisa</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-45/#comment-1859828</link>
		<dc:creator><![CDATA[Aurealisa]]></dc:creator>
		<pubDate>Sun, 17 Aug 2025 04:18:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1859828</guid>
		<description><![CDATA[I agree that ransomware attacks are becoming more sophisticated, especially targeting managed service providers (MSPs) and critical infrastructure.]]></description>
		<content:encoded><![CDATA[<p>I agree that ransomware attacks are becoming more sophisticated, especially targeting managed service providers (MSPs) and critical infrastructure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Lost In Press</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-45/#comment-1826689</link>
		<dc:creator><![CDATA[Lost In Press]]></dc:creator>
		<pubDate>Thu, 02 May 2024 06:45:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1826689</guid>
		<description><![CDATA[Making a website is very easy but keep it secure from security hackers is hard. we need to scan and check regularly our website.]]></description>
		<content:encoded><![CDATA[<p>Making a website is very easy but keep it secure from security hackers is hard. we need to scan and check regularly our website.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bestsafe glove co ltd</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-45/#comment-1806646</link>
		<dc:creator><![CDATA[bestsafe glove co ltd]]></dc:creator>
		<pubDate>Sun, 25 Jun 2023 09:24:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1806646</guid>
		<description><![CDATA[For most recent information you have to go to see the 
web and on world-wide-web I found this web page as a best web site for latest updates.]]></description>
		<content:encoded><![CDATA[<p>For most recent information you have to go to see the<br />
web and on world-wide-web I found this web page as a best web site for latest updates.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: mik</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-45/#comment-1779415</link>
		<dc:creator><![CDATA[mik]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 15:30:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1779415</guid>
		<description><![CDATA[Cibercriminal and listener are everywhere... in order to protect your privacy, you shoud have device like this one: https://www.endoacustica.com/speech-protection-system.php]]></description>
		<content:encoded><![CDATA[<p>Cibercriminal and listener are everywhere&#8230; in order to protect your privacy, you shoud have device like this one: <a href="https://www.endoacustica.com/speech-protection-system.php" rel="nofollow">https://www.endoacustica.com/speech-protection-system.php</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1753033</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 Jan 2022 21:19:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1753033</guid>
		<description><![CDATA[FTC: U.S. consumers lost $770 million in social media scams in 2021, up 18x from 2017
https://techcrunch.com/2022/01/27/ftc-u-s-consumers-lost-770-million-in-social-media-scams-in-2021-up-18x-from-2017/?tpcc=tcplusfacebook

A growing number of U.S. consumers are getting scammed on social media according to a new report by the Federal Trade Commission (FTC), which revealed that consumers lost $770 million to social media scams in 2021 — a figure that accounted for about one-fourth of all fraud losses for the year. That number has also increased 18 times from the $42 million in social media fraud reported in 2017, the FTC said, as new types of scams involving cryptocurrency and online shopping became more popular. This has also led to many younger consumers getting scammed, as now adults ages 18 to 39 reported fraud losses at a rate that’s 2.4x higher than adults 40 and over.]]></description>
		<content:encoded><![CDATA[<p>FTC: U.S. consumers lost $770 million in social media scams in 2021, up 18x from 2017<br />
<a href="https://techcrunch.com/2022/01/27/ftc-u-s-consumers-lost-770-million-in-social-media-scams-in-2021-up-18x-from-2017/?tpcc=tcplusfacebook" rel="nofollow">https://techcrunch.com/2022/01/27/ftc-u-s-consumers-lost-770-million-in-social-media-scams-in-2021-up-18x-from-2017/?tpcc=tcplusfacebook</a></p>
<p>A growing number of U.S. consumers are getting scammed on social media according to a new report by the Federal Trade Commission (FTC), which revealed that consumers lost $770 million to social media scams in 2021 — a figure that accounted for about one-fourth of all fraud losses for the year. That number has also increased 18 times from the $42 million in social media fraud reported in 2017, the FTC said, as new types of scams involving cryptocurrency and online shopping became more popular. This has also led to many younger consumers getting scammed, as now adults ages 18 to 39 reported fraud losses at a rate that’s 2.4x higher than adults 40 and over.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1751875</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 19 Jan 2022 13:09:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1751875</guid>
		<description><![CDATA[https://www.baeldung.com/linux/advanced-file-permissions]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.baeldung.com/linux/advanced-file-permissions" rel="nofollow">https://www.baeldung.com/linux/advanced-file-permissions</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1751874</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 19 Jan 2022 13:09:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1751874</guid>
		<description><![CDATA[Google Says NSO Pegasus Zero-Click &#039;Most Technically Sophisticated Exploit Ever Seen&#039;
https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen

Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that included a PDF file pretending to be a GIF image with a custom-coded virtual CPU built out of boolean pixel operations.

Within Apple’s CoreGraphics PDF parser, the NSO exploit writers abused Apple’s implementation of the open-source JBIG2, a domain specific image codec designed to compress images where pixels can only be black or white.

Describing the exploit as “pretty terrifying,” Google said the NSO Group hackers effectively booby-trapped a PDF file, masquerading as a GIF image, with an encoded virtual CPU to start and run the exploit.

&quot;JBIG2 doesn&#039;t have scripting capabilities, but when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That&#039;s exactly what this exploit does,&quot; the researchers explained.

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution 
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html]]></description>
		<content:encoded><![CDATA[<p>Google Says NSO Pegasus Zero-Click &#8216;Most Technically Sophisticated Exploit Ever Seen&#8217;<br />
<a href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen" rel="nofollow">https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen</a></p>
<p>Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that included a PDF file pretending to be a GIF image with a custom-coded virtual CPU built out of boolean pixel operations.</p>
<p>Within Apple’s CoreGraphics PDF parser, the NSO exploit writers abused Apple’s implementation of the open-source JBIG2, a domain specific image codec designed to compress images where pixels can only be black or white.</p>
<p>Describing the exploit as “pretty terrifying,” Google said the NSO Group hackers effectively booby-trapped a PDF file, masquerading as a GIF image, with an encoded virtual CPU to start and run the exploit.</p>
<p>&#8220;JBIG2 doesn&#8217;t have scripting capabilities, but when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That&#8217;s exactly what this exploit does,&#8221; the researchers explained.</p>
<p>A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution<br />
<a href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html" rel="nofollow">https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1751678</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 18 Jan 2022 15:16:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1751678</guid>
		<description><![CDATA[https://semiengineering.com/creating-iot-devices-that-will-remain-secure/]]></description>
		<content:encoded><![CDATA[<p><a href="https://semiengineering.com/creating-iot-devices-that-will-remain-secure/" rel="nofollow">https://semiengineering.com/creating-iot-devices-that-will-remain-secure/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1751677</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 18 Jan 2022 15:15:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1751677</guid>
		<description><![CDATA[https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/" rel="nofollow">https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/01/30/cyber-trends-for-2021/comment-page-44/#comment-1751676</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 18 Jan 2022 15:15:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187599#comment-1751676</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/technology/bleepingcomputers-most-popular-cybersecurity-and-tech-stories-of-2021/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/technology/bleepingcomputers-most-popular-cybersecurity-and-tech-stories-of-2021/" rel="nofollow">https://www.bleepingcomputer.com/news/technology/bleepingcomputers-most-popular-cybersecurity-and-tech-stories-of-2021/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
