Friday Five: 10/9 Edition



Happy Friday! Close out the work week with our picks for the hottest articles from the IT and security presses:

  1. "Hackers who targeted Samsung Pay may be looking to track individuals " by Stephen Lawson
    Samsung has recently confirmed that its Pay service experienced a data breach via LoopPay; which Samsung had acquired in February as the technology being used in the Samsung Pay service. At first it was promised that no personal information was put at risk – however, recent speculation claims that the infamous Codoso Group in China might have been behind the attack. If that is the case, the breach might be at a much bigger scale than expected. To learn more about Samsung Pay’s recent data breach, read this article.
  2. "Average Cost of Cyber-crime in the U.S. Rises to $15 Million by Sean Kerner
    The U.S. has been a top target of cybersecurity attacks in the past year – as a result the average cost of a cyber crime incident has risen to 15 million; up 19 percent since 2014. Multiple factors have been driving up the cost and attack remediation is one of the primary drivers. To learn more about this statistic, read this article.
  3. "Report finds many nuclear power plant systems “insecure by design”" by Sean Gallagher
    A recent study shows that many civilian nuclear energy facilities are vulnerable to attacks via their industrial control systems. The vulnerabilities could cause many disturbances, including internal damage or destruction. To learn more about the insecurity of nuclear power plant designs, read this article.
  4. "Google launches its Cloud Platform Security Scanner out of beta, minutes after Amazon announced Inspector" by Jordan Novet
    Remember the Cloud Security Scanning tool that Google released in beta back in February? On Wednesday, Google officially launched the service; it’s free and it will find potential security flaws such as XSS, Flash Injection, and more. This release came immediately on the heels of Amazon’s launch of Inspector, a similar scanning tool. To learn more about Google’s most recent cloud security service launch, read this article.
  5. "Smartphones On Drones Can Hack Your Wireless Printer" by Thomas Claburn
    Researchers from Singapore University of Technology and Design’s iTrust lab have recently found that a smartphone can potentially hack an unprotected wireless printer. To carry out the attack, researchers fitted a drone with a smartphone running an app built to intercept files being sent to the printer and offload them to a DropBox folder on the device. The drone was used to get the phone within close enough proximity to execute the wireless attack. To learn more about this recent study, read this article.
Susan Xu

Please post your comments here

Digital Guardian Data Visibility & Control

Learn how you can get out-of-the-box data visibility and device control 

Read now

Related Articles
Surveillance Reform May Arrive In Time for Christmas

The USA Liberty Act would require government agents to obtain a warrant before collecting communications belonging to U.S. persons.

Friday Five: 1/26 Edition

IoT botnets, encryption, GDPR -- catch up on the week's infosec news with this roundup!

Malicious Chrome Extension Mined Cryptocurrency via Facebook

A Chrome extension has been removed from Google's webstore that was found spreading through Facebook, stealing passwords and cryptocurrency.