Tuesday, October 15, 2019

Security expert: More cellphone users getting hacked | kvue.com

AUSTIN, Texas — Free charging stations are popping up in more public spaces from airports to hotel rooms to rental cars, but that convenience is making cellphone users vulnerable to hackers.

While the threat isn't new, one mobile security expert said mobile device users have made it easy for them.

* * *

"We've let our guard down a little bit and believe devices just can't be exploited," he said. "The reality just can't be further from the truth."

He showed us what it would like after the phone was hacked. You may be surprised to discover it's the same – you can't tell.

"There's really nothing as a user that I would notice or see that would tell me somebody has this type of access," he said.

Zimperium released a global threat report that found it doesn't really matter if you have an Android or an iPhone.

Publisher: KVUE
Date: 10/14/2019 10:59:20 PM
Twitter: @KVUE
Reference: (Read more) Visit Source



And here's another article:

Hackers are trading millions of stolen passwords on a secret network - Business Insider

These secret networks are only growing, according to Alex Heid, chief research and development officer at SecurityScorecard , a cybersecurity firm.

"Within the hacking underground community, credentials are bought, sold, and traded for free like Pokémon cards," Heid told Business Insider. "There are dozens of different hacking forums that have terabytes of information going back 10-plus years."

* * *

Hackers are using increasingly sophisticated database software to aggregate "combo lists" of millions of login credentials, according to Heid.

Publisher: Business Insider
Date: 2019-10-04
Author: Aaron Holmes
Twitter: @sai
Reference: (Read more) Visit Source



Council Post: What Executives Should Understand About A New Type Of Hacker Campaign

Blue Hexagon , a deep learning innovator focused on protecting organizations from cyberthreats.">Saumitra is CTO and Co-Founder of  Blue Hexagon , a deep learning innovator focused on protecting organizations from cyberthreats.

Threat actors know that one of the most effective ways to attack a company is by exploiting trusted relationships! Videos for Security Expert : More Cell Phone Users 2:20 Public charging stations could pose a security threat | KVUE YouTube!! If a hacker can obtain and insider's credentials, they can do great damage, accessing and stealing valuable data and resources, including money and intellectual property.

Similarly, if a hacker can use an important person's identity to get information or cause other people to take certain actions that benefit the hacker, the implications can be devastating to the organization.

This is the theory behind what is known as a "supply chain" attack, which is a recent threat development that, instead of posing as an individual, aims to use the identity of trusted relationships with an outsourcing company as the platform for further attacks against customers, partners and vendors.

Publisher: Forbes
Date: 2019-10-14
Author: Saumitra Das
Twitter: @forbes
Reference: (Read more) Visit Source



A hacker's paradise? 5G and cyber security | Financial Times

However, the faster speeds are also likely to present an opportunity for hackers to target more devices and launch bigger cyber attacks, experts say.

These devices, known as the Internet of Things (IoT) — where everything from cars and factory assembly lines to baby monitors and traffic lights have embedded internet-connected sensors — are growing fast. The number of internet-connected items will grow from 14.2bn to 25bn by 2021, according to Gartner, a research company.

As IoT devices connect to 5G networks, they could prove a tempting target for hackers and criminals.

“The sheer number of connected assets and devices heightens security challenges,” says Dan Bieler, principal analyst at Forrester, a research company! 1:01 Huawei, ZTE phones banned by Pentagon over spying fears neither sold nor banned by Canadian military Global News!! Hackers tend to target new technologies as they are often more vulnerable to cyber attacks than well-established technologies, he adds.

logo
Publisher: Financial Times
Date: 2019-10-14T04:03:16.000Z
Twitter: @FinancialTimes
Reference: (Read more) Visit Source



Quite a lot has been going on:

5 Lessons for Better Security from a Friendly Hacker | BizTech Magazine

Hackers may be the top adversary of the IT security professional, to be sure, but hackers can also be valuable teachers, said Keren Elazari, a cybersecurity analyst, author and researcher, speaking at CDW's IT Leadership SummIT held Oct. 10–11 in Chicago.

"Hackers are not just digital natives," she said. "We're also early adopters. That means if you look at what hackers are doing now, you'll have a good glimpse into the future as well. "

Elazari spoke on "What Every IT Leader Should Know About Cybersecurity: A Friendly Hacker's Perspective."

Case in point: Ransomware attacks on the city of Baltimore that left some city services unavailable for days. According to CNN, she said, more than 140 organizations in state and local government, police departments and healthcare, among others, have been infected by ransomware this year.

Publisher: Technology Solutions That Drive Business
Date: 1571060094
Reference: (Read more) Visit Source



This New Bitcoin And Cryptocurrency Exchange Can't Be Hacked

Bitcoin exchange hacks have plagued the cryptocurrency ecosystem since the first platforms for trading were launched in the early 2010s, and these events have caused major public relations issues for the entire crypto asset market! 7 mobile security threats you should take seriously in ...Users are actually three times more likely to respond to a phishing attack on a mobile device than a desktop, according to an IBM study — in part because a phone is where people are most likely ...!! While exchange hacks don't have anything to do with potential technical problems related to the underlying Bitcoin network, it's never a good look when millions or even billions of dollars worth of Bitcoin is stolen from thousands of exchange customers in a matter of minutes.

Although the Bitcoin exchange industry has improved its ability to deal with crypto asset security over the years, the threat of another large hack is always looming over the ecosystem! Which Phone Is the Most Secure? | Time time.com ...Which Phone Protects Your Security the Best? We Asked the Experts . Subscribe ...according to a mobile ...While that gives developers more freedom in terms of app design and users more freedom to ...!! But that could soon change.

* * *

In the past, exchange customers have always deposited their coins onto trading platforms with the exchange taking custody of the funds! Cell Phone Security | Wireless Threats - Consumer Reports www.consumerreports.org ...Many companies that make mobile services possible could take more steps toward smart-phone security , experts say. Platform makers Whose platform is more secure , Apple's (iPhone) or Google's ...!! That exchange platform then becomes a central point of focus for hackers because there's a big payday in it for them if they're able to get into the exchange's internal wallet.

Publisher: Forbes
Date: 2019-10-15
Author: Kyle Torpey
Twitter: @forbes
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

$22.99—Echo Dot With Amazon Basics Smart Color Bulb.

Echo Dot with Amazon Basic​s S...

Popular Posts