Threats

Insecure network attached storage devices are the common thread in a string of data breaches, including the recent leak of US Air Force personnel files, security experts say.

NAS Holes: Air Force Data Leak the Tip of Very Large Iceberg

In-brief: The recently disclosed trove of personnel files by an US Air Force officer is one piece of a much larger phenomenon: exposed, vulnerable and Internet-connected network attached storage (or NAS) devices chock full of gigabytes sensitive data.

Twitter accounts belonging to media organizations and prominent personalities (like tennis great Boris Becker) were hacked and hijacked, displaying pro Turkish messages accusing Dutch and German officials of Nazi sympathies. (Image courtesy of Twitter.)

Twitter Hack is latest to underscore Third Party App Risk

In-brief: security experts are warning about the threat posed by third-party applications that tap into prominent social media platforms like Twitter after accounts belonging to media organizations and prominent personalities were hacked and hijacked to display messages accusing Dutch and German officials of Nazi sympathies. 

Companies should make life harder for cyber criminals by ceasing the use of valuable, "static" data to authenticate consumers. (Image courtesy of the Library of Congress.)

Opinion: Disrupt Fraud by Devaluing Data

In-brief: companies that want to make life difficult for cyber criminals can start by moving valuable data off the front lines and finding ways to use less valuable information to verify the identity of their customers, writes Keir Breitenfeld, who works for Experian’s Fraud & Identity Solutions group.

The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored "advanced persistent threat" groups, the firm FireEye said in its most recent M-Trends report.

Report: Hacking Crews are all APT now

  In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.

Flaws found in telepresence robots by the firm Double Robotics could make it easy to take control of the devices remotely. (Image courtesy of Double Robotics.)

Telepresence Robots? Hackable.

In-brief: Residents of Uncanny Valley have something more to worry about: telepresence robots by the firm Double Robotics contain numerous, exploitable vulnerabilities, the firm Rapid7 reports.