“The situation seems eerily similar to the Edward Snowden leak, and has drawn renewed attention to insider threats and the risks posed by authorized users granted access to sensitive information in corporate networks.
…While insider attacks and leaks of sensitive data from the NSA make for very salacious headlines, insider threats are in no way limited to the NSA or government agencies. Every company has some information and data of a sensitive nature that should not be shared or seen outside the company, and every company faces the risk that an employee with access to that data could expose it—either intentionally or inadvertently.”
Read more: http://techspective.net/2016/10/11/nsa-contractor-arrest-highlights-risk-insider-threats/
“The arrest of a National Security Agency contractor charged with stealing highly classified material is yet the latest example of a trend that officials say can be every bit as dangerous as an outside hacker: the insider threat.
…insider threats pose a delicate and difficult challenge and can be hard to detect, especially since large amounts of data can be downloaded quickly and stored on tiny devices.”
Read more: https://www.washingtonpost.com/business/economy/nsa-case-highlights-growing-concerns-over-insider-threats/2016/10/06/61b90a5e-8bc7-11e6-bf8a-3d26847eeed4_story.html
“Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee, said in a statement that Martin’s arrest made it ‘painfully clear that the Intelligence Community still has much to do to institutionalize reforms designed to protect in advance the nation’s sources and methods from insider threats.'”
Read more: https://www.washingtonpost.com/world/national-security/government-contractor-arrested-for-stealing-top-secret-data/2016/10/05/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html
“USB sticks containing harmful malware have been left in Australian letterboxes, police in Victoria have warned.
…The devices are “extremely harmful” and should not be used, police say.
It is not uncommon for USB sticks to be used to carry and transmit destructive malware and viruses to computers.
Cybersecurity experts have called the technology “critically flawed“, and in 2014 demonstrated to the BBC how any USB device could be used to infect a computer without the user’s knowledge.”
Read more: http://www.bbc.co.uk/news/technology-37431335
Gigavation thought leadership on cyber security panel at flagship Detroit Automotive Conference
“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”
“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”
“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”
Read more: http://deloitte.wsj.com/cio/2016/04/18/caution-cyber-risks-ahead-for-connected-cars/
“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …
‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.
Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”
Read more: http://www.thestreet.com/story/13446854/1/industrial-hacking-how-cyber-crime-went-pro.html
“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”
“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”
“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”
“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”
Read More: http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/?utm_source=twitterfeed&utm_medium=linkedin
“A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.”
“This is not the first security vulnerability from Google’s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.”
“Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology.”
Read More: http://www.msn.com/en-us/news/technology/security-flaw-compromises-location-of-nest-thermostat-owners/ar-BBoyymM
Gigavation leadership: Keynote Speaker on the Cybersecurity panel at the Automotive USA 2015 Conference alongside OEMs and other telematics experts.
Atlanta, November 16-17, 2015