Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

The Wars We Wage

App stores are the greatest hostile software delivery system ever invented by man. There are over 50,000 apps that you can download from the Google App store, and over 10,000 of them are some sort of spyware, malware or phishing software.” ~ Rob Smith, a GTISC advisory board member and CTO of Mobile Active Defense (M.A.D.) Partners

Apple apps are even worse,” Smith added. Since people often believe Apple applications are exempt from malicious infection, few are security conscious when downloading or purchasing new applications from the iTunes Store. Apple does not have a system in place to track hidden codes; its vetting process only determines if the app does what its purveyors claim it does, and if so then it is approved for download.

Mobile devices represent an escalating risk. “With the expansive use of a variety of mobile devices in the enterprise today, threats to the network are coming in different forms.

“You don’t have the same security behind mobile devices as you would have behind your laptop. You have to make sure you don’t leave any obvious weak spots from where things can find a way into the network.” ~ Mustaque Ahamad, director of the GTISC

The Georgia Tech Information Security Center (GTISC) last week released its Emerging Cyber Threats Report, which offers insight into the malicious tactics it expects to be prevalent in 2011. The report, based on GTISC research and collaboration with security industry experts, covers the increasing sophistication of botnets, mobile attacks and related cybersecurity issues.

Did you read down this far?

Those are snippets from an article that caught my attention because it mentioned how the cybercriminals are now poisoning MRI machines in hospitals.. the article is here.

(Maybe I’m just grouchy. I have to have a cavity filled today. But I’m beginning to think something needs to done about this “cybercrime” stuff.)

Copyright 2007-2010 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. << 


Share this post :

October 21, 2010 - Posted by | advice, computers, cyber crime

4 Comments »

  1. TechPaul,

    Cavities and Cybercrime, somehow seem like they should be in the same category.

    Hope you did well…

    Rick

    Like

    Comment by Ramblinrick | October 21, 2010 | Reply

    • Rick,
      You’re on your game today. Nice catch!

      Like

      Comment by techpaul | October 21, 2010 | Reply

  2. Tech Paul, with your article directing us to a further interesting read…”Cyber criminals are now poisoning MRI machines in hospitals.” Wow!

    Little do we stop to think the cyber attacks COULD zone in on everything related to the technology we use everyday. “Food for Thought” of course it COULD; so yes, we have to become more vigilante.

    G.

    Like

    Comment by Gaia | October 22, 2010 | Reply

    • Gaia,
      That kind of topic leads me in to much deeper areas, as we humans seem to be determined to computerize everything, and then hook it to the Internet, secured or not, (think “smart meters”, for one)(I am awaiting the day when I shave each morning with a “facial recognition” razor..) and my article’s point is that folks need to be cognizant of their smart phones too.
      Those interested in the very real topic of cyber-warfare might start here — SANS: The Future of Information Warfare.

      What you and I and the family next door need to be aware of, and act on, is not so “deep”. It is simply that we have to realize that the Internet is a dangerous place, and we need to exercise defensive measures and behaviors… which I have repeatedly outlined here, and will continue to advise/provide How To’s, etc..

      Like

      Comment by techpaul | October 22, 2010 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: