Vulnerable Smart City Devices Can Be Exploited To Cause Panic, Chaos

Vulnerable Smart City Devices Can Be Exploited To Cause Panic, Chaos | #TpromoCom #CyberSecurity #Hackers #Hacker #SmartCity | False alerts about floods, radiation levels are just some of the ways attackers can abuse weakly protected IoT devices, researchers warn.

To read the remainder of this news article, click here.

Dark Reading | Security | Protect The Business - Enable Access

Al’s Viewpoint: Hackers are quick to take advantage of any and all vulnerabilities where it comes to any and everything “Internet.” IoT is a godsend, and yet it’s a curse. I continue to get notices of impending doom, weather emergencies, etc. on my dumbphone and I ignore them all. Yes, at my own peril.  But I also listen to the radio (when I’m not on Internet Radio).  Life is too short to live it in fear. Know the limits of the tech as well as the vulnerabilities and risks and use it with all of this in mind. –Al Colombo

Please follow and like us:

“Internet of Things (IoT) Security in Smart Home Devices”

Internet of Things (IoT) Security in Smart Home Devices | #TpromoCom #IoT #Hacker #Hackers | 25 insights from testing 50 devices on the market in 2015. Download this report now: click here. (scroll down for more)

Internet of Things (IoT) Security in Smart Home Devices

The Internet of Things (IoT) refers to devices that can send or receive data automatically, without being prompted by human interaction. Examples are cars that notify drivers of low tire pressure, a security system notifying the home owner, or smart thermostats maintaining optimum home temperature based on outside weather.

These devices have very low security protocols. While attackers or hackers have not found a way to profit from taking control of devices yet, it is only a matter of time. The most common access points are through the cloud or the home Wi-Fi Ethernet network. Device owners can protect themselves by:

  • Ensuring strong security protocols and encryption on the home network
  • Changing default passwords
  • Disabling unneeded features or features not in use
  • Avoid secondhand (and therefore potentially compromised) devices
  • Install updates as they become available.

Offered Free by: InsightBrief

Please follow and like us:

How to mitigate IoT threats to video surveillance systems

How to mitigate IoT threats to video surveillance systems | #TpromoCom #IoT #Hacker #Hackers #CyberSecurity |  as device connectivity continues to define the digital age, monitoring the technology that monitors us is demanding stricter rules and protocols to ensure risk is mitigated, threats are dealt with in a proactive manner and global laws are managed.  (read more)

bigstock Internet Of Things Concept Bac 236246614 5b3f7fa276ea6

Please follow and like us:

AN ELABORATE HACK SHOWS HOW MUCH DAMAGE IOT BUGS CAN DO

AN ELABORATE HACK SHOWS HOW MUCH DAMAGE IoT BUGS CAN DO | #TpromoCom #IoT #Hacker #Security #Data | The bulk of major corporate hacks follow time-tested strategies, like phishing emails that trick employees into giving up their credentials, or hackers exploiting a bug in a web portal. While effective, these strategies also open an attacker to early detection. So increasingly, hackers have taken the scenic route—through the Internet of Things.

Vulnerabilities in internet-connected devices are well-documented by this point, but the most common exploitations generally involve conscripting thousands of vulnerable IoT devices into botnets, or getting onto a network through a weak IoT device for ransomware attacks. These aren’t using data-stealing missions. But researchers from the IoT security firm Senrio have shown that a company’s publicly exposed IoT devices can form an unsupervised backroad path into networks. Attackers can jump from one vulnerable IoT device to the next, totally bypassing mainstream devices like PCs and servers, and charting a course that’s much harder to detect.

“No matter what we do, no matter how good our IT people may be, there’s going to be a hacker out there with more skill, more criminality ingrained into his being than all of us put together. When it comes right down to it, like physical security, it’s not a matter of ‘if’ there’ll be a data breach in our network, but rather ‘when.'” –Al Colombo

To read the remainder of this informative article, click here.

Please follow and like us:

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated  | #TpromoCom #China #Telco #Spy |  Britain’s main cyber security agency said on Monday it had written to organizations in the UK’s telecommunications sector warning them about using services or equipment from Chinese telecom equipment maker ZTE Corp.

“NCSC assess that the national security risks arising from the use of ZTE equipment or services within the context of the existing UK telecommunications infrastructure cannot be mitigated,” said Ian Levy, the Technical Director of the National Cyber Security Center.

As the cold war with China heats up, it’s obvious that there’s no length to which either side will go to stay ahead of the other. And then again, I recall shipments of digital telco switches that were shipped to  China from the United  States in the 1990’s that had “back doors” installed in the software. Tit for tat is the name of the game and we’re going to see a whole lot more of this in the near future. –Al Colombo

To read the original news story, click here.

Please follow and like us:

Would Facebook and Cambridge Analytica be in Breach of GDPR?

Would Facebook and Cambridge Analytica be in Breach of GDPR? | #TpromoCom #Facebook #GDPR #CyberSecurity |  The Cambridge Analytica (CA) and Facebook accusations over the U.S. 2016 presidential election campaign, and to a lesser extent between CA and the UK’s Brexit VoteLeave campaign, are — if proven true — morally reprehensible. It is not immediately clear, however, whether they are legally reprehensible. The matter is currently under investigation on both sides of the Atlantic.

On March 26, both Apple and IBM called for more regulatory oversight on the use of personal data. “I’m personally not a big fan of regulation because sometimes regulation can have unexpected consequences to it, however I think this certain situation is so dire, and has become so large, that probably some well-crafted regulation is necessary,” said Apple chief Tim Cook on March 24, 2018. To read the remainder of this news story, click here.

GDPR - European Data Protection

Please follow and like us:

Privacy, Data Woes Pile Up for Facebook and Google

#Privacy, #Data Woes Pile Up for #Facebook and #Google | #TpromoCom # # # |  As the fallout continues from recent news reports detailing how Facebook enabled “digital warfare” based on its users’ personal data, Google is also facing heat for the vast troves of information it collects about people.

To read this interesting and informative news story, click here.

Privacy, Data Woes Pile Up for Facebook and Google

Please follow and like us:

150 million MyFitnessPal accounts compromised – here’s what to do

150 million #MyFitnessPal accounts compromised – here’s what to do | #TpromoCom #Data #Hacker #Hackers |  Under Armour’s hugely popular fitness tracker, MyFitnessPal, has been hacked. If you’re one of the 150 million or so users of the app or website don’t panic, but do change your password.

If you use Facebook to log in to MyFitnessPal you do not need to change your Facebook password.

If you use your MyFitnessPal password on any other websites, change your password on those websites – choose a different, strong password for each one (consider using a password manager if that sounds too difficult).

To read the remainder of this informative news story, click here.

Please follow and like us: