- In a ‘watering hole attack’, hackers infected the online menu of a Chinese restaurant (unconventional method) when it was browsed by the employees, as they failed using the conventional methods.
- Apart from the conventional emails and leaky devices, hackers are using company’s heating and cooling systems, printers, thermostats, videoconferencing equipments to hack.
- Third parties such as heating, ventilation, billing, expense and human resources, health insurance providers and even vending machines, which are granted remote access to corporate systems, are posing a big threat to company security.
- It is speculated that between 23-70% of breaches happens through third-party suppliers. Heating and cooling providers have access to company’s networks to remotely monitor and adjust office temperatures.
- Although these vendors don’t employ stringent security standards, they are allowed behind the firewall that protects the networks. Also these equipments are often delivered with their security systems switched off. This allows hackers find a way in relatively easily, and hide in plain sight.
- Scientist at Georgia Institute of Technology have designed a new security system called LatentGesture that provides a personal touch signature to secure gadgets by continuously monitoring the user’s taps and swipes. If the movements do not match the owner’s, the system recognizes the differences and can be programmed to lock the device. It showed 98% accuracy on smart phones and 97% accuracy on tablets.
Exams Perspective:
- Ethical Hacking
- Latent Gesture Security System
- Remote Access
- Cyber Crimes
- Cyber Security