But we all need to be more aware that the rise in popularity of smart home and IoT (Internet of Things) devices has been accompanied by an increase in the discovery of critical vulnerabilities that threaten to expose unsuspecting users to a litany of privacy breaches.
In other words, that shiny, perfectly packaged gadget you're taking home or purchasing for a friend or loved one could actually be a secret passage into your home. Cyberspace is not pacific; criminals have migrated online. We hear stories about smart assistants listening to your every word, building comprehensive profiles of you and your habits for the perfect targeting of advertisements; door and security camera companies handing over footage to law enforcement .
In case you are keeping track:
The ‘Do’s & Don’ts’ Of Online Shopping To Avoid Being Hacked –
MINNEAPOLIS (WCCO) — It’s one of the biggest weekends of the year for holiday shopping. And according to Adobe Analytics, shoppers spent $7.4 billion online during Black Friday. And the total is expected to be even higher for Cyber Monday.
Experts say the holiday shopping online is a prime target for hackers. WCCO’s Kate Raddatz talked with Ryan Cloutier, a cybersecurity analyst and consultant, for some “do’s and don’ts” of Cyber Monday shopping. He says while you’re hunting for a bargain, hackers are hunting for your personal information.
A decade of hacking: The most notable cyber-security events of the 2010s | ZDNet
The 2010s decade is drawing to a close and ZDNet is looking back at the most important cyber-security events that have taken place during the past ten years.
Over the past decade, we've seen it all. We've had monstrous data breaches, years of prolific hacktivism, plenty of nation-state cyber-espionage operations, almost non-stop financially-motivated cybercrime, and destructive malware that has rendered systems unusable.
Below is a summary of the most important events of the 2010s, ordered by year. We didn't necessarily look at the biggest breaches or the most extensive hacking operations but instead focused on hacks and techniques that gave birth to a new cyber-security trend or were a paradigm shift in how experts looked at the entire field of cyber-security.
Cyber crime: Hackers could gain access to your new internet connected car in seconds |
The founder of cybersecurity firm Verimatrix says motoring companies must prevent easy access to a car’s software and identify vulnerabilities to boost security.
The revolution means hackers can, in theory, gain access to connected vehicles which could lead to devastating consequences for road users.
Asaf Ashkenazi said: “In fact, it’s accepted in the development community to expect a certain number of bugs even in finished code.
Check out this next:
From pirates to politicians and from hackers to seafarers: A decade of maritime's most
The 10th instalment of Lloyd’s List’s Top 100 most influential people in maritime will be published on December 13
* * *
Subject: From pirates to politicians and from hackers to seafarers: A decade of maritime's most influential players
New SMS Messaging Update Reportedly Leaves Users Exposed To Hackers
For the uninitiated, Rich Communication Services or RCS is the answer of mobile networks to over the top (OTT) platforms that steals the traffic away from SMS text messaging. It is the answer, particularly for Android users, to the stickiness of iMessage from Apple's hybrid platform. RCS could introduce the fastest adoption by a messaging technology with countless devices activated.
The only drawback of RCS is that it does not have the end to end encryption, unlike popular OTT platforms. The system remains rooted in the GSM's man in the middle architecture. Cybersecurity researchers at SRLabs in Germany report that the provisioning process for activating RCS functionality on a smartphone, in several networks, is poorly protected. Because of this, hackers can fully take over user accounts.
New Android Text Messaging Update 'Exposes Most Users To Hacking'
Sitting behind the plans for RCS is the mobile industry's trade association, the GSMA. And from a technical standpoint, the driving force is Google. It promises to shift SMS away from its clunky format to a new world of video, e-ticketing and mobile services. Because it's a replacement for SMS, it is being deployed by the networks rather than as an app that sits across those networks with no direct interface.
According to the new report from the cybersecurity researchers at Germany's SRLabs, "the provisioning process for activating RCS functionality on a phone is badly protected in many networks, allowing hackers to fully take over user accounts." And for Android specifically, the most popular RCS client Android Messages "does not implement sufficient domain and certificate validation, enabling hackers to intercept and manipulate communication through a DNS spoofing attack."
The IoT is vulnerable — hackers just need a business model - Stacey on IoT | Internet of Things
Concerns about vulnerable connected devices in enterprise and industrial settings have recently been widespread, but for the most part, any hacks have been relatively small and committed by nation states. The Stuxnet virus is one example. However, once a business model emerges that can turn an attack into profits, the danger will explode.
That is the conclusion of a new report from Trend Micro , which is based on its predictions for the coming year. TrendMicro already did a deep dive into risks that will come from hackers figuring out how to monetize the IoT back in September, but it still ranked highly in its 2020 predictions list. Other predictions affecting the IoT involve serverless computing and the threat of supply chain attacks via home workers.
Happening on Twitter
As the weather is getting cooler, get ready to cozy up at home with #DowntonAbbeyFilm! Experience it with your whol… https://t.co/q1DBPKNjo4 DowntonAbbey (from Highclere Castle and Bampton) Sat Nov 23 23:16:51 +0000 2019
No comments:
Post a Comment