This is the 52nd episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions. This episode was hosted by Tom Eston and Scott Wright. This episode was recorded March 9, 2016. Below are the show notes, commentary, links to articles and news mentioned in the podcast:
Unexpected implications arising from the Internet of Things
This was an interesting article about some of the “unexpected” security and privacy things that people don’t really think about. For example, what are the ramifications of IoT technology that might be hacked to create fake sensor and video data for criminal activity? What happens to the security budgets of organizations that need to address these new risks? It’s an interesting time to be in this space.
Peer-Seeking Webcam Reveals the Security Dangers of Internet Things
This is just one example but like other new IoT related technology data is being sent to multiple third-parties and peer networks are being created, all without your knowledge. What makes this webcam interesting is that disabling the peer sharing capability doesn’t actually disable anything. How many other devices like this have the same issue?
Follower: the “creepiest social network” that follows you in real life
Just when you thought the traditional social networks we use were sometimes creepy, here comes “Follower”. Follower is a social network that allows you to have real people follow you around and take pictures of your activities all without you knowing where your “follower” is. If you’re looking for a real-life stalker this might be the social network you’re looking for.
Payroll data leaked for current, former Snapchat employees
Two recent breaches highlight the need for more eduction about targeting phishing attacks. Both Snapchat and Seagate each fell victim to a very similar phishing attack targeting payroll information. The attack was very simple and also very easy to spot if you know the signs of an attack like this.
The Cerber Ransomware not only Encrypts Your Data But Also Speaks to You
Ransomware has been around for awhile but now we’re starting to see the next evolution of this type of malware…where it talks back to you. Give this article a read if you want to know more about how this malware works and what to do if your computer is infected with it.
Please send any show feedback to feedback [aT] sharedsecurity.net or comment below. You can also call our voice mail box at 1-613-693-0997 if you have a question for our Q&A section on the next episode. Be sure to visit our website, follow us on Twitter and like us on Facebook. Thanks for listening!