Yes, 2014 is here and we’re surrounded by more and more personally identifiable information (PII) theft, as predicted. Keep an eye on these at http://www.privacyrights.org and find out that we all have common vulnerabilities and exposures (CVEs) which are searchable here at the National Vulnerability Database (NVD) at http://nvd.nist.gov.
In addition, as I predicted last month, we are entering a year of Mobile malware that spies on you. Why? For governments, for cybercriminals, for online predators and as part of a new attack vector used by hackers. Remember in last month’s edition, I brought up the Android Flashlight app behaving maliciously? Who would have known the NSA could be spying on you through Angry Birds? This is only the tip of the iceberg of what’s really happening out there. Why do so many people trust so many untrustworthy applications? We each want more functionality and productivity on our smartphones and tablets as a replacement for the bulky office desktop computer – as a result, we’re all willing to fall for the hook of a ‘freebie’ application – but is anything truly free in this world? Why would a calculator application need to geolocate you on GPS and eavesdrop on wifi? Why would a weather updating application need access to your contacts list, wifi, phone data protocols and GPS? The list goes on.
As I said last month, first it’s adware then spyware, then real ‘spook’ spyware where governments spying on each other and their citizens, then it’s the monetization of criminal malware where more and more citizens lose their personally identifyable information (PII) possibly followed by hidden bitcoin p2p malware used for mining –imagine your favorite app like Angry Birds or Candy Crush, running on over
100m smartphone devices becomes a network of 100m bitcoin computations. So, as we enter 2014, we enter 1984 coming to fruition – it’s the year of many big brothers, starting with the NSA. We should now all agree that PRIVACY is all uppercase in 2014. Yes, it matters – big time!
Growing mobile spying stories leading to new concerns about your personal PRIVACY, your business
PRIVACY and all IT ‘big data’ PRIVACY.
To our faithful readers, Enjoy
1.Read each FLIPBOOK edition electronically, online and flip through the page:
http://www.cyberdefensemagazine.com/newsletters/january-2014/index.html
2.Download a color PDF copy – make sure you have Adobe Acrobat reader.
http://www.cyberdefensemagazine.com/newsletters/january-2014/CDM-Cyber-Warnings-January-2014.pdf
3.Read the MOBILE versions online in your favorite web browser:
http://www.cyberdefensemagazine.com/newsletters/january-2014/mobile/index.html
(Security Affairs – cyber security, CDM)
Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…
A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…
The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…
A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…
The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…
The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…
This website uses cookies.