7 Sneaky Cybersecurity Threats

by

October 8, 2020

Not every cyber-attack is a large scale data breach or ransomware attack. Even the average computer user is liable to encounter some sort of cyber-kerfluffle during their lifetime.

Wired wrote up a great article the other day that spoke to that and I thought it’d be a good idea to summarize that for you, dear reader.

The sneaky cybersecurity threats are:

  • Rogue USB Sticks
  • Zombie Accounts
  • Untrusted Browser Extensions
  • Bogus Online Quizzes
  • Leaky Photo Uploads
  • Smart Home Snooping
  • Malicious Charging Cables

Rogue USB Sticks

USB sticks are handy. You can store almost anything on one. Even some fairly dangerous code. Ransomware and viruses can be configured make a mess instantly or over time.

It’s a safe practice not to trust strange USB drives all.

Zombie Accounts

Braaaaaaaaaains…

Kidding aside, a “Zombie Account” is an account set up on a service (social media, app, etc) and then abandoned or forgotten. Since we’re all more than willing to share PII data on any new, hip service that rears its ugly head, each of these “zombie accounts” is a time bomb waiting to happen.

The best thing to do with a service or application, once you’re done with it, is to scrub it completely of PII. But, since most people forget or fail to do that, an abandoned account can be a prime target for an attacker.

Untrusted Browser Extensions

Browser extensions are a dime a dozen. Some are incredibly helpful. Problem is there are a TON of browser extensions out there in the wild. A lot of those come from faceless, nameless developers. It stands to reason some of them may in fact be nefarious.

Bad browser extensions can do things like sell your browsing data, inundate you with pop-up advertising or even install additional software. It’s probably a better idea to limit yourself to known good-actors and cut out everything else.

Bogus Online Quizzes

Quizzes. I didn’t like them in school, I don’t like them now. The only difference being in school a quiz’s purpose was to find out what you know, now they’re a tool used by bad hombres to steal information from you.

Social media quizzes are used to create detailed profiles and that information is stored

Leaky Photo Uploads

There’s a risk anytime you upload a photo to the internet. I’ve talked about that before here (Is FaceApp Really a Security Threat?). Photos contain more than just some nice scenery and a few smiling faces.

I’m talking of course, about meta data. Facebook and Instagram will strip such things from a photo. Other services don’t. Metadata can include all sorts of things, including physical locations. Bad actors have been known to use it to help track down a target.

Smart Home Snooping

In today’s world everything is an Internet of Things device. Even our homes. We can control our lights, our door locks, our thermostats, all over the internet. As smart homes become more and more popular they become bigger targets for attackers.

One way around the issue would be buying IoT connected devices only from trusted manufacturers.

Malicious Charging Cables

Sigh, a good charging cable, never around when you need one…

Just like thumb drives (see above), third-party charging cables can come packed with some awful surprises. These cables can look just like the genuine article but can give hackers a backdoor into your device, simply by plugging it in.

The only real solution is to problem is using charging cables supplied directly by the manufacturer. Yeah, they’re often expensive to replace but it’s worth it.

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don’t forget to follow us on LinkedIn and Twitter

Carl Keyser is the Content Manager at Integris.

Keep reading

Bridging the Gap between Automation and Innovation

Bridging the Gap between Automation and Innovation

Automation and Innovation. Some people might say those two words cancel each other out. Yet, I believe these two concepts can create capacity for each other—if your business leverages the free time automation creates to foster innovation. Automation can be...

Why Is My Laptop Draining So Fast?

Why Is My Laptop Draining So Fast?

Before You Replace Your Laptop Battery, Try These Fixes First Stuck with a laptop that’s running out way before it’s standard 8-10 hours of run time? Don't throw it out just yet.  Try these quick fixes to extend its life: Reduce your screen brightness If possible,...