Home / Blogs

Three New Cyber Security Threats in One Day

Wout de Natris

Internet crooks never cease to surprise me. The inventiveness in being bad is super. If these guys lent their thinking power to the economy, the economic crisis would be solved within a week.

Today I ran into three brand new cyber security threats that were reported on. In one day. So I thought to share them with you.

1. Samsung's smart tv wide open to criminals

Who would have thought. The moment I read about TVs connecting to the Internet, I thought: trouble. Despite the fact that just about everything that connects to the Internet for the first time was hacked before the TV, e.g. printers, digital photo frames, cell phones, Playstations, etc., etc., apparently no one in the TV world thought that a layer of defence might be necessary. Perhaps it's time to work with sanctions or develop some standards before a device is allowed to connect?

What is next? Sorry if I'm a bit sarcastic here.

2. QR codes that lead to malicious sites

QR stands for Quick Response (see Wikipedia). Recently these codes were all over the place, making the life of end users easier to live or that of businesses of course.

In The Netherlands they have found stickers on QR codes in the public domain leading to malicious websites for infections or phishing. So, from now on the public can never trust another QR code again as there's no way of telling if one is false or true. Please check whether it is stickered on, please, before use?

3. Blue tooth devices in skimming

Now the public is more alert for skimming apparently there's a new generation working via blue tooth. Interesting.

Luckily the FBI dismantled a botnet with the help of Facebook, so there is some good news also in the balance.

The moral

Cyber crime is about opportunity and this window of opportunity needs to be closed as soon as possible. That way there is less money to be gained, so most criminals will go elsewhere. In order to achieve this, cooperation is adamant. On which I expect to write more in the near future. But also, it's time and I repeat, to think security through before decisions towards connectivity are made. Don't do something just because you can!!!

By Wout de Natris, Consultant international cooperation cyber crime + trainer spam enforcement. More blog posts from Wout de Natris can also be read here.

Related topics: Cybercrime, Malware, Policy & Regulation, Security

 
   
WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

Factsheet Dutch National Cyber Security Center Wout de Natris  –  Dec 13, 2012 1:54 AM PDT

Last week, so I found out just now, the Dutch NCSC has published a factsheet on securing the connectivity of devices that are connected to the Internet. It's in Dutch, but may help you to gain knowledge or define your strategy. Click here.

To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Industry Updates – Sponsored Posts

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

i2Coalition to Host First Ever Smarter Internet Forum

Encrypting Inbound and Outbound Email Connections with PowerMTA

Resilient Cybersecurity: Dealing with On-Premise, Cloud-Based and Hybrid Security Complexities

Verisign Releases Q4 2015 DDoS Trends - DDoS Attack Activity Increasing by 85% Year Over Year

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud

Dyn Weighs In On Whois

Data Volumes and Network Stress to Be Top IoT Concerns

DKIM for ESPs: The Struggle of Living Up to the Ideal

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Sponsored Topics

Afilias

DNS Security

Sponsored by
Afilias
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Verisign

Security

Sponsored by
Verisign
Port25

Email

Sponsored by
Port25