Home / Blogs

Three New Cyber Security Threats in One Day

Internet crooks never cease to surprise me. The inventiveness in being bad is super. If these guys lent their thinking power to the economy, the economic crisis would be solved within a week.

Today I ran into three brand new cyber security threats that were reported on. In one day. So I thought to share them with you.

1. Samsung’s smart tv wide open to criminals

Who would have thought. The moment I read about TVs connecting to the Internet, I thought: trouble. Despite the fact that just about everything that connects to the Internet for the first time was hacked before the TV, e.g. printers, digital photo frames, cell phones, Playstations, etc., etc., apparently no one in the TV world thought that a layer of defence might be necessary. Perhaps it’s time to work with sanctions or develop some standards before a device is allowed to connect?

What is next? Sorry if I’m a bit sarcastic here.

2. QR codes that lead to malicious sites

QR stands for Quick Response (see Wikipedia). Recently these codes were all over the place, making the life of end users easier to live or that of businesses of course.

In The Netherlands they have found stickers on QR codes in the public domain leading to malicious websites for infections or phishing. So, from now on the public can never trust another QR code again as there’s no way of telling if one is false or true. Please check whether it is stickered on, please, before use?

3. Blue tooth devices in skimming

Now the public is more alert for skimming apparently there’s a new generation working via blue tooth. Interesting.

Luckily the FBI dismantled a botnet with the help of Facebook, so there is some good news also in the balance.

The moral

Cyber crime is about opportunity and this window of opportunity needs to be closed as soon as possible. That way there is less money to be gained, so most criminals will go elsewhere. In order to achieve this, cooperation is adamant. On which I expect to write more in the near future. But also, it’s time and I repeat, to think security through before decisions towards connectivity are made. Don’t do something just because you can!!!

By Wout de Natris, Consultant internet governance

Filed Under

Comments

Factsheet Dutch National Cyber Security Center Wout de Natris  –  Dec 13, 2012 8:54 AM

Last week, so I found out just now, the Dutch NCSC has published a factsheet on securing the connectivity of devices that are connected to the Internet. It’s in Dutch, but may help you to gain knowledge or define your strategy. Click here.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix