Saturday Security Spotlight: Military, Apps, and Threats

This post was originally published here by Ā Jacob SerpaĀ .

Here are the top cybersecurity stories of recent weeks:

  • Fitness app exposes military bases
  • Soldiers’ names revealed by app
  • Google Play filled with fake apps
  • Medical devices easily hacked
  • The internet of things creates risk for the enterprise

Fitness app exposes military bases

Strava, the creators of a fitness tracking app,Ā released heatmaps of its users’ movements.Ā Unfortunately, this revealed the inner workings of military bases abroad by highlighting the movements of soldiers who use said app within their bases. Naturally, making this information publically available raises questions of privacy andĀ national security.

Soldiers’ names revealed by app

After learning of the above heatmaps and how they expose military bases and personnel, a Norwegian researcher decided toĀ test other aspects of Strava’s security. In so doing, he succeeded in tricking the app to reveal the names and identities of military personnel who use Strava.Ā 

Google Play filled with fake apps

Despite efforts toĀ clean up Google Play,Ā Google’sĀ app marketplaceĀ still contains many fakeĀ applications. While some are fairly innocuous, others can spreadĀ malwareĀ or steal information from users’Ā mobile devices. In light ofĀ BYODĀ (bring your own device), this should be a concern for the enterprise.Ā 

Medical devices easily hacked

Researchers in cybersecurity have determined thatĀ medical devicesĀ like MRI machinesĀ face a high risk of cyberattack. As healthcare technology evolves and connects to the internet more and more, the risk will only increase. Researchers warn that these devices must be designed in ways that ensure more security.Ā 

The internet of things creates risk for the enterprise

AsĀ enterprises adopt IoT devicesĀ for the efficiency that they provide, they are also increasing the number of attack surfaces that can be exploited by malicious parties. These devices serve as entry points for malware and can enable access to corporate networks.

The cybersecurity landscape is constantly shifting. Organizations must stay ahead of threats withĀ advanced security solutions. To learn aboutĀ cloud access security brokers,Ā download the Definitive Guide to CASBs.

Photo:Cybersecurity Insiders

Ad

No posts to display