Android Century
  • Home
  • Android Zone
    • Android Apps
    • Android Games
    • Apps APk Files
    • Games Apk Files
    • Apps Hack Tricks
  • Reviews
  • Fantasy Zone
    • Entertainment
    • Quotes and Status
    • Life Style
    • Home Made Tips
    • Hair Care
    • Skin Care
    • Fantasy Tips
  • Tricks
    • Free Recharge
    • Free Internet
    • shopping Cashback
    • Recharge Cashback
  • Tech
  • Mobiles
  • Gadgets
  • News
  • How To's
  • Software
Breaking
Loading...

Featured post

How to Take Great Photos With Apple's iPhone X

Recent Posts

Labels

  • Android Apk Files
  • Android Apps
  • Android Games
  • Apps Apk Files
  • Entertainment
  • Fantasy Tips
  • Gadgets
  • Hair Care
  • HomeMade Tips
  • How To's
  • News
  • Quotes
  • Quotes & Status
  • Recharge Cashback
  • Recharge Promo Codes
  • Shopping Cashback
  • Technology
  • skin care
Home / News / The 7 security threats to technology that scare experts the most

The 7 security threats to technology that scare experts the most

Latest Govt. Jobs 16:35:00 News Edit
img 20170215 112719

What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.
Some of these threats target consumers directly, but even the ones that target corporations could eventually “filter down” to consumers, though the effects might not be felt for some time.

The seven deadly attacks

Here are the seven most dangerous attack vectors, according to SANS, and what, if anything, you can do about them:
[ Further reading: How the new age of antivirus software will protect your PC ]
1. Ransomware: Ransomware surfaced more than 20 years ago, but it has since evolved into a seriously scary form of malware: crypto-ransomware, which encrypts your files and demands payment to unlock them. It’s an ideal way for bad guys to attack: Ransomware spreads like a virus, locks up your data independently, and forces you to contact the criminals for payment and recovery, according to Ed Skoudis, an instructor at the SANS Institute.
What you can do: Practice “network hygiene:” patching your system, using antimalware, and setting permissions and network-access controls to limit exposure—once a PC is infected, you don’t want the infection spreading to other PCs on the network. Remember that ransomware is being monitored by actual people, with whom you can negotiate: “Your best bet is to appear small and poor,” Skoudis said, to try to reduce the amount you’ll pay.
2. The Internet of Things. The next stage of the evolution in consumer products is connectedness: Everything from baby cameras to toothbrushes are using wireless protocols to connect to each other and the internet. That, in turn, has left them vulnerable to hacks. Worse still, IoT devices are now attack platforms, as the Mirai worm demonstrated.
What you can do: Change the default passwords. If your smart-home gadget doesn’t allow it, either return it or wait (or petition the manufacturer) for firmware that allows a custom password. You can also take further steps to insulate connected devices by disabling remote access, using a separate dedicated home LAN for IoT devices, as well as a dedicated cloud account for controlling them, Skoudis said.
3. The intersection of ransomware and IoT. Last year, an Austrian hotel was hacked, disrupting its keycard system. Such attacks could eventually migrate to your home, holding your smart thermostat hostage (and set at 40 degrees, say) until you pay up.
What you can do: Right now, this sort of attack is more theoretical than anything else. But it’s something to think about as you start building out your home: How much automation is too much? “You have to ask yourself, what is the right balance between man and machine?” said Michael Assante, director of industrials and infrastructure for SANS.
ukraine attackMark Hachman
A summary of the 2015 attack on then Ukraine power stations, as provided by the SANS Institute.
4. Attacks against the industrial Internet of Things. In 2015 and again in 2016, unknown hackers took down power stations in the Ukraine, leveraging the growing trend of automated, distributed systems against the power company. Fortunately, first responders were quickly able to manually flip the breakers and restore power. But there’s no guarantee that will always be the case—and what happens if Pacific Gas & Electric or Con Edison’s infrastructure is hacked?
What you can do: As consumers, not much. Infrastructure organizations are going to have to decide whether to operate with intelligent systems, or shut them down. Scaling up with increased automation can help lower your power costs—but the penalty may be increased vulnerability to outside attacks, Assante warned.
ukraine attackMark Hachman
A summary of the 2015 attack on Ukraine power stations, as provided by the SANS Institute.
5. Weak random number generators. Truly random numbers are the basis of good encryption, securing Wi-Fi and a broad range of security algorithms, according to Johannes Ulrich, the director of the SANS Internet Storm Center. But  “random” number generators aren’t truly random, which makes the encryption they’re based upon easier to crack. This gives an edge to criminals, who may exploit this and unlock “secure” encrypted connections.
What you can do: This is a problem for device manufacturers to solve. Just keep in mind that your “secure” network may in fact be weaker than you think.
6. An over-reliance on web services. More and more, apps and software are talking to and incorporating third-party services, such as Docker or Azure. But there’s no real certainty that those apps are connecting to the expected entity, or whether an attacker is stepping in, stealing data, and returning false information.
What you can do: Again, this is a problem for developers. But Ulrich warned that mobile apps are becoming increasingly vulnerable—so even if an app isn’t trying to steal your data, the “service” that it thinks it’s connecting to may be.
7. SoQL Attacks against NoSQL databases. This is another developer problem, but it could affect data collected about you. For years, SQL injections, where executable code was forced inside of a SQL database entry field, were one of the scourges of the internet. Now, as developers move away from SQL to NoSQL databases like MongoDB, they’re finding that those databases aren’t as secure as they should be.
Share on Facebook Share on Twitter Share on Google Plus

RELATED POSTS


LG G7 with iPhone X-like notch

Oppo F7 India launch confirmed

Alcatel 1x with Android Oreo (Go ed...
The 7 security threats to technology that scare experts the most The 7 security threats to technology that scare experts the most Reviewed by Latest Govt. Jobs on 16:35:00 Rating: 5

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments ( Atom )

Search This Blog

TEST BOOK FOR GOVT ENTRANCE TEST

TEST BOOK FOR GOVT ENTRANCE TEST
Find All Latest book for preparation of SSC,RAILWAYBANK PO,RBI,BANK CLERK,GATE ME,GATE CE are available here in less prices, to check out the books click here

Translate

  • Popular Post
  • Random posts
  • Category

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & Earn Offer:  Hey Guys! Today I make an article about Teen Patti Referral ...
  • Hands-on with the home windows 10 Creators update for the Xbox One: Beam recreation streaming arrives
    The Windows 10 Creators Update is here, now—yes,  now —but not (officially) on the PC. The ...
  • Taotronics TT-BH22 Headphones Review
    We make it a addiction to now not look up pricing of a product sooner than reviewing and if ...
  • Pentagon strongly condemns North Korea missile test
    The Pentagon on Monday strongly condemned North Korea’s latest missile test, adding that the ...
  • Jio effect: Telcos may have to cut data rates 2017
    India's big  telecom  companies,  Bharti Airtel ,  Vodafone India  and  Idea Cellular , will be ...
  • Bank wallets growing faster than e-wallets
    In the  bank  versus  e-wallets  sweepstakes,  lenders  have now gained lost ground. As of ...

Random Posts

  • New Optoma NuForce BE6i (2017) review
    New Optoma NuForce BE6i (2017) review
    04.03.2017 - 0 Comments
    Optoma VERDICT Although the NuForce BE6i is a minor refresh of the original, its longer battery life…
  • Zoook launched new ZB-Rocker M3 Mean Machine Mini speaker
    Zoook launched new ZB-Rocker M3 Mean Machine Mini speaker
    09.08.2017 - 0 Comments
    French technology company Zoook has launched the successor to M2 Mean machine in India. Dubbed as…
  • Dell unveils XPS 15 2-in-1 with 8th Gen Intel Core processor, Radeon RX Vega M
    Dell unveils XPS 15 2-in-1 with 8th Gen Intel Core processor, Radeon RX Vega M
    18.01.2018 - 0 Comments
    Dell XPS 15 2-in-1 laptop features maglev keyboard along with Active Pen, which can be clipped on to the…
  • How to Get Rid of Avira’s Notifications, Sounds, and Bundled Software
    How to Get Rid of Avira’s Notifications, Sounds, and Bundled Software
    19.02.2017 - 0 Comments
    Avira is one of the less intrusive antivirus programs for Windows (that’s why we recommend it),…
  • Gionee A1 review: Great selfies, good battery life make it worth the price
    Gionee A1 review: Great selfies, good battery life make it worth the price
    18.04.2017 - 0 Comments
    The last few years have seen Gionee stumble a bit in the Indian market thanks to companies like Xiaomi…

Labels

Android Apk Files Android Apps Android Games Apps Apk Files Apps Hack Tricks Entertainment Free Internet Freecharge Gadgets Games Apk Files How To's Laptops Guide Mobiles Reviews Technology Viral's android zone free recharge

Entertainment

Tricks

Popular Posts

  • Reliance Jio set to charge subscribers from April 1,2017
    India's mobile-telephony companies are headed for a fresh round of price wars after the country's ...
  • Steam Now Supports PS4's DualShock 4 Controller
    HIGHLIGHTS ...
  • Hands-on: HP's Lap Dock helps your Windows Phone feel more like a real PC
    HP’s Lap Dock ...
  • Jio effect: Telcos may have to cut data rates 2017
    India's big  ...
  • WhatsApp, Telegram patch flaws in instant messaging applications
    WhatsApp and ...
  • Lenovo HW02 Plus fitness band Review
    Lenovo HW02 Plus ...
  • How to Make a Long Distance Relationship Work?
    Long distance ...

Random Posts

  • Samsung's connect domestic mesh wi-fi router comes with a SmartThings Hub built-in
    Samsung's connect domestic mesh wi-fi router comes with a SmartThings Hub built-in
    30.03.2017 - 0 Comments
    Mixed in among the excitement at Samsung's Galaxy S8 launch on Wednesday, the company also…
  • Leaked docs suggest NSA and CIA behind Equation cyberespionage group
    Leaked docs suggest NSA and CIA behind Equation cyberespionage group
    10.03.2017 - 0 Comments
    Purported CIA documents leaked Tuesday appear to confirm that the U.S. National Security Agency and one…
  • Xiaomi Mi A1 Android 8.0 Oreo update back after suspension
    Xiaomi Mi A1 Android 8.0 Oreo update back after suspension
    18.01.2018 - 0 Comments
    Xiaomi has resumed the roll out of Android8.0 Oreo update for Mi A1 smartphone, after temporarily…
  • How To Add Categories Section in Blogger Blog
    How To Add Categories Section in Blogger Blog
    10.03.2017 - 0 Comments
    The first and easiest way to create categories section in Blogger is to rename the section of…
  • New WhatsApp Terms of Service
    New WhatsApp Terms of Service
    22.02.2018 - 0 Comments
    NEW DELHI: In an apparent hint that Facebook is set to monetise its WhatsApp operations, a new Terms of…

Most Popular

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J ...
  • Top 5 Best SmartPhones under 7000 Rs (March 2017)
    Looking for the ...
  • Apple, IBM, Cisco are huge because of Indians, do not deny them H-1B visa: RBI Governor Urjit Patel
    ...
  • SAMSUNG GALAXY J7 (2016) Specifications
    SAMSUNG GALAXY J ...
  • BlackBerry Teases Marshmallow Beta Testing for Priv by Next Week
    Blackberry ...
  • LG Q6 Review
    LG Q6 Review
    2017 is ...

Contact Form

Name

Email *

Message *

Offers Zone

Created By Android Century Distributed by Android Century
  • Home
  • About us
  • Contact us
  • Privacy policy
  • Terms of use
  • Advertise here
Subscribe Via Email Subscribe To Android Century By Email And Get Free Updates. ;-)


Your email address is safe with us!