The Week in CybersecuritysteemCreated with Sketch.

in security •  7 years ago 

Cybersecurity stories and insights for the last week of July 2017.      

Adobe is Finally Killing FLASH — At the End of 2020!  

Security professionals rejoice! Like a zombie, Flash has lived on for far too long. It's security flaws are legendary. Glad to see Adobe is making the right, albeit difficult, choice to EOL in 2020 . Ironically, after EOL, Adobe will not publish updates or patches which will make legacy installs more insecure for those who have not migrated to different solutions (HTML5, WebGL, etc.).     

Alleged BTC-E Admin Arrested for Laundering $4 Billion in Bitcoin  

How do you launder $4 billion? Cryptocurrency. This is one reason that cyber and organized criminals continue to be drawn to Bitcoin and other the next generation cryptocurrencies like Zcash, Monero, and others which provide even more privacy and anonymity.     

Exploring the Psychology of Ransomware

An interesting study in how ransomware operators are using aspects of scarcity, authority, and consequence to influence victims to pay. They are taking pages from marketing and sales playbooks.     

It’s a Myth that Most Cyber-Criminals are ‘Sophisticated’

It is important to understand that not all attackers are the same. There are varying archetypes that differ in motivation, capabilities, and objectives. This largely determines their targets, persistence, and methods. Cyber-criminals are motivated by financial gain, they typically look for the easiest victims that will satiate their goals. Methods will vary across technical and behavioral vulnerabilities, but align to the path-of-least-resistance axiom. If you want to familiarize yourself with a comprehensive picture of different archetypes, take a look at the Threat Agent Library or other similar lists.     

Gas Pump Skimmer Sends Card Data Via Text 

It always fascinates me when we see hardware based attacks. There is a certain level of purpose, complexity, and planning involved in such exploits. It shows that threats are willing to make interesting trade-offs when it comes to pursuing their goals. This gives us insights to their range of actions, technical competencies, and level of commitment. It also provides opportunities to interdict threat-agents as they pursue such paths.     

$1,500 'smart' gun hacked with $15 magnets

The convergence of cyber and physical security mandates a greater level of scrutiny when it comes to matters of life-safety. Connecting devices to the internet or other electronic mechanisms inherently introduces a number of new vulnerabilities. For items that potentially hold the safety of people in the balance, it should not be done without proper planning, design, testing, and sustaining support. Failure could be catastrophic.       


Images Sources: 


Interested in more? Follow me on LinkedIn, Twitter (@Matt_Rosenquist), Information Security Strategy, and Steemit to hear insights and what is going on in cybersecurity. 

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Thanks for taking the time. Great stuff.

So wrong, so right, and all funny!


The more digital our lives become, the more at risk we are.

Absolutely correct! There is a direct relationship.

Nice post! Could you post them weeikly, monthly? :D

If I have time. I do post a lot of comments and interact in conversations on my LinkedIn page. I am trying to get my fellow cybersecurity professionals to use Steemit. You are welcome to follow me on LI as well.

I like reading and commenting on cyber security in linked in. I would love to do more here. But I still feel a bit clumsy on Steemit. I've seen people insert links to Steemit blogs in linked in. I might experiment with that sooner or later. https://www.linkedin.com/in/maryjanephillips/

Connecting to you in LinkedIn. Keep the cybersec conversations going!

Thank you, will do and wait for your post :)! Keep up good work

I mean if Visa,Matercard, US goverment are getting hacked- I dont even want to know how easy it would be to hack an average pc at home

Hi @mrosenquist, thanks for your valuable content about cybersecurity, upvoted! I think every cryptotrader must use a VPN network. I made a atricle about free VNP networks (mostly for beginners). Do you agree this must be the basic security for your transactions?

VPN technology is an important tool for privacy and security.

Is it just me or are hacks of this nature becoming increasingly popular?

Yes and it will get worse.

Let's make room for progress!