News / Security /

Hackers May Soon Use Sensory Technology to Infect Smartphones with Malware


Today’s IP news roundup highlights some of the latest headlines in network security:

  • Researchers from the University of Alabama at Birmingham have figured out how to trigger malware on smartphones by using sensory channels such as light, vibrations and music. SC Magazine reported that the researchers “described one example in which music that blares from a speaker could cause compromised smartphones to carry out malicious activities at a sports event.” The researchers were able to trigger mobile phones from as far as 55 feet away, due to the advanced sensory technology in the mobile devices. For more information on the paper “Sensing-Enable Channels for Hard-to-Detect Command and Control of Mobile Devices”, see SC Magazine.  
  • LinkedIn now offers higher levels of security and password protection. According to PC Magazine, LinkedIn is now offering all of its members two-factor authentication as an optional service. According to PC Magazine, “Those who opt in will have to enter their regular password, plus a numeric code that is sent to their phone via SMS every time they log in.” This means that to compromise your account, hackers will need not only your password but also access to your mobile phone. For instructions on how to enable this new LinkedIn security feature, see the PC Magazine article.  
  • Encryption is key to protecting your data in the cloud. An article on USAToday.com reminds us that “your data in the cloud is your responsibility, no matter what the cloud provider does or says. If a data breach occurs, you will bear all of the consequences, positive and negative.” The article recommends using encryption as a form of security. However, you must “make sure your cloud provider gives you control over the keys so only you have access.” For more information on cloud encryption, see USAToday.com.  
  • Energy executives cited network security and cybersecurity as top concerns in the latest Ernst and Young “Business Pulse: Oil and Gas” study. This was the first time IT security appeared in the study’s top-ten list of concerns. According to the study, energy executives are particularly worried about intellectual property theft, commercial espionage and operational sabotage. The study also revealed that the majority of these threats come from inside the organization. For more information on oil and gas network security threats, see UPI.com.        
  • And finally … SC Magazine has declared the Java exploit the June threat of the month. The exploit can impact Java version 7 Update 17 and prior and should be a concern, as it “is now bundled in various exploit kits that allow arbitrary code execution in a reliable manner.” SC Magazine recommends that you run Update 21 to fix this vulnerability. For more information on Java exploits, see SC Magazine.

What is your take on today’s news? Feel free to share your opinions below.

Comments are closed.