Sunday, December 1, 2019

If your home is getting smarter, it's more vulnerable to hackers

But we all need to be more aware that the rise in popularity of smart home and IoT (Internet of Things) devices has been accompanied by an increase in the discovery of critical vulnerabilities that threaten to expose unsuspecting users to a litany of privacy breaches.

In other words, that shiny, perfectly packaged gadget you're taking home or purchasing for a friend or loved one could actually be a secret passage into your home. Cyberspace is not pacific; criminals have migrated online. We hear stories about smart assistants listening to your every word, building comprehensive profiles of you and your habits for the perfect targeting of advertisements; door and security camera companies handing over footage to law enforcement .

Publisher: CNBC
Date: 2019-11-30T15:30:29+0000
Author: Tom Kellerman head cybersecurity strategist at VMware Carbon Black
Twitter: @CNBC
Reference: (Read more) Visit Source



In case you are keeping track:

The ‘Do’s & Don’ts’ Of Online Shopping To Avoid Being Hacked –


MINNEAPOLIS (WCCO) — It’s one of the biggest weekends of the year for holiday shopping. And according to Adobe Analytics, shoppers spent $7.4 billion online during Black Friday. And the total is expected to be even higher for Cyber Monday.

Experts say the holiday shopping online is a prime target for hackers. WCCO’s Kate Raddatz talked with Ryan Cloutier, a cybersecurity analyst and consultant, for some “do’s and don’ts” of Cyber Monday shopping. He says while you’re hunting for a bargain, hackers are hunting for your personal information.

Date: 2019-12-01T22:30:13+00:00
Author: http facebook com CBSMinnesota
Twitter: @/wcco
Reference: (Read more) Visit Source



A decade of hacking: The most notable cyber-security events of the 2010s | ZDNet

The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.

Over the past decade, we've seen it all. We've had monstrous data breaches, years of prolific hacktivism, plenty of nation-state cyber-espionage operations, almost non-stop financially-motivated cybercrime, and destructive malware that has rendered systems unusable.

Below is a summary of the most important events of the 2010s, ordered by year. We didn't necessarily look at the biggest breaches or the most extensive hacking operations but instead focused on hacks and techniques that gave birth to a new cyber-security trend or were a paradigm shift in how experts looked at the entire field of cyber-security.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Cyber crime: Hackers could gain access to your new internet connected car in seconds |

The founder of cybersecurity firm Verimatrix says motoring companies must prevent easy access to a car’s software and identify vulnerabilities to boost security. 

The revolution means hackers can, in theory, gain access to connected vehicles which could lead to devastating consequences for road users. 

Asaf Ashkenazi said: “In fact, it’s accepted in the development community to expect a certain number of bugs even in finished code. 

Publisher: Express.co.uk
Date: 2019-12-01T16:01:00+00:00
Author: Luke Chillingsworth
Reference: (Read more) Visit Source



Check out this next:

From pirates to politicians and from hackers to seafarers: A decade of maritime's most

The 10th instalment of Lloyd’s List’s Top 100 most influential people in maritime will be published on December 13

* * *

Subject: From pirates to politicians and from hackers to seafarers: A decade of maritime's most influential players

Publisher: Lloyd
Author: Linton Nightingale
Twitter: @LloydsList
Reference: (Read more) Visit Source



New SMS Messaging Update Reportedly Leaves Users Exposed To Hackers

For the uninitiated, Rich Communication Services or RCS is the answer of mobile networks to over the top (OTT) platforms that steals the traffic away from SMS text messaging. It is the answer, particularly for Android users, to the stickiness of iMessage from Apple's hybrid platform. RCS could introduce the fastest adoption by a messaging technology with countless devices activated.

The only drawback of RCS is that it does not have the end to end encryption, unlike popular OTT platforms. The system remains rooted in the GSM's man in the middle architecture. Cybersecurity researchers at  SRLabs in Germany report that the provisioning process for activating RCS functionality on a smartphone, in several networks, is poorly protected. Because of this, hackers can fully take over user accounts.

Publisher: International Business Times
Date: 2019-12-01T06:30:52-05:00
Author: Nica Osorio
Twitter: @IBTimes
Reference: (Read more) Visit Source



New Android Text Messaging Update 'Exposes Most Users To Hacking'

Sitting behind the plans for RCS is the mobile industry's trade association, the GSMA. And from a technical standpoint, the driving force is Google. It promises to shift SMS away from its clunky format to a new world of video, e-ticketing and mobile services. Because it's a replacement for SMS, it is being deployed by the networks rather than as an app that sits across those networks with no direct interface.

According to the new report from the cybersecurity researchers at Germany's SRLabs, "the provisioning process for activating RCS functionality on a phone is badly protected in many networks, allowing hackers to fully take over user accounts." And for Android specifically, the most popular RCS client Android Messages "does not implement sufficient domain and certificate validation, enabling hackers to intercept and manipulate communication through a DNS spoofing attack."

Publisher: Forbes
Date: 2019-11-30
Author: Zak Doffman
Twitter: @forbes
Reference: (Read more) Visit Source



The IoT is vulnerable — hackers just need a business model - Stacey on IoT | Internet of Things

Concerns about vulnerable connected devices in enterprise and industrial settings have recently been widespread, but for the most part, any hacks have been relatively small and committed by nation states. The Stuxnet virus is one example. However, once a business model emerges that can turn an attack into profits, the danger will explode.

That is the conclusion of a new report from Trend Micro , which is based on its predictions for the coming year. TrendMicro already did a deep dive into risks that will come from hackers figuring out how to monetize the IoT back in September, but it still ranked highly in its 2020 predictions list. Other predictions affecting the IoT involve serverless computing and the threat of supply chain attacks via home workers.

logo
Publisher: Stacey on IoT | Internet of Things news and analysis
Date: 2019-11-26T08:00:40-06:00
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

‘American Idol' Winner Seeks Fans Support After Career Crashes

Ryan Seacrest may have called out his name as an American Idol winner, but for Noah Thompson , ...

Popular Posts