Friday, June 1, 2018

A new game in the video game

It’s the 80s, where Space Invaders appeared for the first time, a video game whose goal was to eliminate alien spaceships with a laser canyon in order to obtain the highest score possible.  Alien spaceships that want to invade a planet. Classic. In cybersecurity, it happens just the same. It’s not about attacking; it’s about defending your privacy and data so that the dangerous aliens won’t get them. 

This week has been decisive in the cybersecurity world, after the implementation of the GDPR (General Data Protection Regulation) and news that have affected the sector. 
In the video game we started the post with, the goal was the spaceships. In malware, the objective is another one. We don’t have any good news to cryptocurrency. The new research about mobile threats in 2018 first trimester, crypto coins are being the focus of an increasing amount of evil apps. The Mobile Threat Landscape Q1 in 2018 research analyzed 120 crypto coins in app stores. Even with these headlines, average news are hopeful, because there’s a lower number of evil apps found. Evil applications are disguised as crypto coins wallets that, once they’re installed, they start stealing the cryptocurrency that that wallet could have. Another interesting data is that 86% of the evil applications share the permit READ_SMS, that allows the app read the messages and that can be used for functions like the authentication of two lateral steps factors. 

Another spaceship attacked by the “Martians” is the health organizations. A mental health clinic decides to pay a rescue to unblock confidential data of some patients. Associates in psychiatry and psychology from Rochester, Minnesota, discovered that someone from the outside had been inside patients data in some computers. The hackers encrypted the names, addresses, birthdays, social security numbers, treatment registers and other data. After thinking about the different options, they decided to pay a rescue to restore their systems. A war that evil spaceships won. 

Hackers’ spaceships are getting more modern. Researchers in the Michigan University (USA) and Zhekiang (China) have discovered that it is possible to block hard drives by ultrasounds.  They have created a new kind of threat: the acoustic attacks. Breaking something as “simple” as hacking a device connected to the internet that could send ultrasounds. This means that we should not have anything near the computer that can project ultrasounds that could break our hard drive.

New ways of attacking, right, or wrong, decisions, and new objectives are the keys. It’s more than spaceships in a video game; it’s affecting the cybersecurity world. A war not far away from “Space Invaders”, that can turn a game into a reality. 


Post a Comment