• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar

Ambition IAS

Online IAS Coaching, Preparation, Test Series & Current Affairs

  • KPSC Material
    • General FAQ
    • Books List
      • KAS Prelims Books List
      • KAS Mains Kannada Book List
      • KAS Mains English Book List
    • Free Downloads
      • KAS Prelims Preparation Time table
      • Karnataka Economic Survey (2013-14)
      • Karnataka Economic Survey (2014-15)
      • Previous Question Papers
    • Buy KPSC Prelims Material
      • Buy KAS Prelims Study Material
    • KPSC Mains Study Material
      • KPSC Mains Study Material
  • Mock Tests
    • Prelims Mock Test
      • Free Mock Tests
      • Paid Test Series
    • Mains Mock Test
      • Daily Free Questions (Updated on WhatsApp Group)
      • Paid Test Series
  • Join WhatsApp Group
  • KPSC Mains Test Series
  • UPSC 2015 Prelims MCQs
  • Doubts Corner
  • Contact Us

Hackers Using Vending Machines, Online Menus to Hack Into Company’s Systems

April 9, 2014 by KRS Leave a Comment

  • In a ‘watering hole attack’, hackers infected the online menu of a Chinese restaurant (unconventional method) when it was browsed by the employees, as they failed using the conventional methods.
  • Apart from the conventional emails and leaky devices, hackers are using company’s heating and cooling systems, printers, thermostats, videoconferencing equipments to hack.
  • Third parties such as heating, ventilation, billing, expense and human resources, health insurance providers and even vending machines, which are granted remote access to corporate systems, are posing a big threat to company security.
  • It is speculated that between 23-70% of breaches happens through third-party suppliers. Heating and cooling providers have access to company’s networks to remotely monitor and adjust office temperatures.
  • Although these vendors don’t employ stringent security standards, they are allowed behind the firewall that protects the networks. Also these equipments are often delivered with their security systems switched off. This allows hackers find a way in relatively easily, and hide in plain sight.
  • Scientist at Georgia Institute of Technology have designed a new security system called LatentGesture that provides a personal touch signature to secure gadgets by continuously monitoring the user’s taps and swipes. If the movements do not match the owner’s, the system recognizes the differences and can be programmed to lock the device. It showed 98% accuracy on smart phones and 97% accuracy on tablets.

Exams Perspective:

  1. Ethical Hacking
  2. Latent Gesture Security System
  3. Remote Access
  4. Cyber Crimes
  5. Cyber Security

Filed Under: Current Affairs, Science and Technology Tagged With: Cyber Crimes, cyber security, Ethical Hacking, Latent Gesture Security System, Remote Access

Primary Sidebar

Subscribe To Newsletter





Like us on Facebook

Copyright © 2023 · Magazine Pro on Genesis Framework · WordPress · Log in