7 Sneaky Cybersecurity Threats

by

October 8, 2020

Not every cyber-attack is a large scale data breach or ransomware attack. Even the average computer user is liable to encounter some sort of cyber-kerfluffle during their lifetime.

Wired wrote up a great article the other day that spoke to that and I thought it’d be a good idea to summarize that for you, dear reader.

The sneaky cybersecurity threats are:

  • Rogue USB Sticks
  • Zombie Accounts
  • Untrusted Browser Extensions
  • Bogus Online Quizzes
  • Leaky Photo Uploads
  • Smart Home Snooping
  • Malicious Charging Cables

Rogue USB Sticks

USB sticks are handy. You can store almost anything on one. Even some fairly dangerous code. Ransomware and viruses can be configured make a mess instantly or over time.

It’s a safe practice not to trust strange USB drives all.

Zombie Accounts

Braaaaaaaaaains…

Kidding aside, a “Zombie Account” is an account set up on a service (social media, app, etc) and then abandoned or forgotten. Since we’re all more than willing to share PII data on any new, hip service that rears its ugly head, each of these “zombie accounts” is a time bomb waiting to happen.

The best thing to do with a service or application, once you’re done with it, is to scrub it completely of PII. But, since most people forget or fail to do that, an abandoned account can be a prime target for an attacker.

Untrusted Browser Extensions

Browser extensions are a dime a dozen. Some are incredibly helpful. Problem is there are a TON of browser extensions out there in the wild. A lot of those come from faceless, nameless developers. It stands to reason some of them may in fact be nefarious.

Bad browser extensions can do things like sell your browsing data, inundate you with pop-up advertising or even install additional software. It’s probably a better idea to limit yourself to known good-actors and cut out everything else.

Bogus Online Quizzes

Quizzes. I didn’t like them in school, I don’t like them now. The only difference being in school a quiz’s purpose was to find out what you know, now they’re a tool used by bad hombres to steal information from you.

Social media quizzes are used to create detailed profiles and that information is stored

Leaky Photo Uploads

There’s a risk anytime you upload a photo to the internet. I’ve talked about that before here (Is FaceApp Really a Security Threat?). Photos contain more than just some nice scenery and a few smiling faces.

I’m talking of course, about meta data. Facebook and Instagram will strip such things from a photo. Other services don’t. Metadata can include all sorts of things, including physical locations. Bad actors have been known to use it to help track down a target.

Smart Home Snooping

In today’s world everything is an Internet of Things device. Even our homes. We can control our lights, our door locks, our thermostats, all over the internet. As smart homes become more and more popular they become bigger targets for attackers.

One way around the issue would be buying IoT connected devices only from trusted manufacturers.

Malicious Charging Cables

Sigh, a good charging cable, never around when you need one…

Just like thumb drives (see above), third-party charging cables can come packed with some awful surprises. These cables can look just like the genuine article but can give hackers a backdoor into your device, simply by plugging it in.

The only real solution is to problem is using charging cables supplied directly by the manufacturer. Yeah, they’re often expensive to replace but it’s worth it.

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don’t forget to follow us on LinkedIn and Twitter

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...