3

SMISHING aka "SMS phishing.

SMiShing is a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his cellular phone or other mobile device. Identity thieves have found a new way to get to your personal information through your cell phone by pretending to be legitimate businesses or financial institutions. This practice is known as SMiShing and you don't have to use your computer to be vulnerable to online scammers. SMiShing is a type of social engineering that uses cell phone text messages to persuade victims to provide personal information such as credit/debit card details, PINs, etc. SMiShing is a derivative of Short Message Service (SMS, which is the communications protocol used for sending text messages on cell phones) - plus Phishing. The incoming text message, which contains a virus, will be a legitimate looking website address or more commonly, a phone number that connects to an automated voice response system, which then asks to confirm your personal details...

6

Internet of Things (IoT) posing as a major & upcoming threat in Cyberspace As Casino Gets hacked via its IoT connected fish tank

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Internet-connected technology, also known as the Internet of Things (IoT), is now part of daily life, with smart assistants like Siri and Alexa to cars, watches, toasters, fridges, thermostats, lights, and the list goes on and on. But of much greater concern, enterprises are unable to secure each and every device on their network, giving cybercriminals hold on their network hostage with just one insecure device. Since IoT is a double-edged sword, it not only poses huge risks to enterprises worldwide but also has the potential to severely disrupt other organisations, or the Internet itself. There's no better example than Mirai, the botnet malware that knocked the world's biggest and most popular websites offline for few hours over a year ago. We have another great example that showcases how one innocent looking insecure IoT device connected to your network can cause security nightmares.

10

Healthcare facilities are a growing target as Hackers infect X-Ray & MRI Machines Globally!

So you thought healthcare facilities are of no ‘hack value’...? You thought wrong! Security researchers have uncovered a new hacking group that is aggressively targeting healthcare organizations and related sectors across the globe to conduct corporate espionage. Dubbed "Orangeworm," the hacking group has been found installing a wormable trojan on machines hosting software used for controlling high-tech imaging devices, such as X-Ray and MRI machines, as well as machines used to assist patients in completing consent forms. According to a new report published by Symantec on Monday, the Orangeworm hacking group has been active since early 2015 and targeting systems of major international corporations based in the United States, Europe, and Asia with a primary focus on the healthcare sector.