SlideShare a Scribd company logo
1 of 15
Download to read offline
10 CYBERSECURITY &
PRIVACY THREATS
DIGITAL SECURITY UPDATE:
2ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
These slides provide insight into apps, web
services, and devices designed to go unnoticed
as they capture your sensitive personal data.
3ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
This presentation was curated by Entefy, the company
building the first universal communicator—an AI-powered
communication platform that helps you seamlessly interact
with the people, services, and smart things in your life.
4ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Anonymous sperm donor
received a Facebook friend
suggestion to connect with
the child born of his donation.
Source: https://gizmodo.com/how-facebook-figures-out-everyone-youve-
ever-met-1819822691
5ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Mattel scuttled an
Internet of Toys product
after two Congressmen
questioned its use to
collect data on children.
Source: https://consumermediallc.files.wordpress.com/2017/09/markey-bar-
ton-letter-mattel-9-28-17.pdf
6ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
A tech journalist’s Google
Home Mini malfunctioned and
recorded him 24/7 without
his permission.
Source: https://www.androidpolice.com/2017/10/10/google-nerfing-home-minis-
mine-spied-everything-said-247/
7ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Apple’s Core ML: When
more and more apps
have access to user data,
it’s harder to guarantee
privacy and security.
Source: https://www.wired.com/story/core-ml-privacy-machine-learning-ios/
8ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
“Permit this app to use your
camera?” Hackers can take
control of smartphone cameras
without opening an app.
Source: https://motherboard.vice.com/en_us/article/mb3ezy/iphone-apps-cam-
era-permission-pictures-videos-without-you-noticing
9ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
There was a 2,502% increase
in malware sales on the Dark
Web during 2017.
Source: https://cdn.www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Re-
port-101117.pdf?utm_source=MIT+Technology+Review&utm_campaign=5e7f9142c5-The_Download&utm_medi-
um=email&utm_term=0_997ed6f472-5e7f9142c5-155902325
10ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Up to 2.6M Android phones are
infected with the Andorid.Sockbot
malware, which adds devices to
global botnets.
Source: https://www.symantec.com/connect/blogs/android-malware-google-play-
adds-devices-botnet-and-performs-ddos-attacks
11ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
Researchers took control
of networked computers
using malware installed on
security cameras.
Source: https://www.sciencedaily.com/releases/2017/09/170919160228.htm
12ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
An emergency FDA notice
showed that not even
pacemakers are safe
from hackers.
Source: https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm
13ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
A security backdoor was
detected in infrastructure
software used by 100 global
banks and energy companies.
Source: https://arstechnica.com/information-technology/2017/08/powerful-backdoor-
found-in-software-used-by-100-banks-and-energy-cos/
14ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
The original research in this presentation comes
from the Entefy article, “10 cybersecurity and privacy
threats that will make you miss Nigerian prince and
lottery email scams.”
15ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS
About Entefy
©2018 ENTEFY INC. ALL RIGHTS RESERVED.
Entefy’s universal communicator is an intelligent
communication platform that seamlessly
connects the people, services, conversations,
contacts, files, apps, smart devices, and smart
things in your digital life.
contact@entefy.com | www.entefy.com

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile securityhome
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating SafetyIBM Security
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacyEntefy
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Digital Dating Safety
Digital Dating SafetyDigital Dating Safety
Digital Dating Safety
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 

Similar to Digital security update: 10 cybersecurity and privacy threats

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West Entefy
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacyEntefy
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsCynthia Calongne
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Michael Altendorf
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Endava
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 

Similar to Digital security update: 10 cybersecurity and privacy threats (20)

10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy9 Alarming developments in the fight for digital privacy
9 Alarming developments in the fight for digital privacy
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
 
2012: This year I learned
2012: This year I learned2012: This year I learned
2012: This year I learned
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015Marketplace Innovation report Q2 2015
Marketplace Innovation report Q2 2015
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 

More from Entefy

10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuseEntefy
 
12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain  12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain Entefy
 
11 Tech habits that are bad for your health
11 Tech habits that are bad for your health11 Tech habits that are bad for your health
11 Tech habits that are bad for your healthEntefy
 
AI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesAI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesEntefy
 
9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening nowEntefy
 
Collected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private dataCollected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private dataEntefy
 
Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Entefy
 
23 proven ways to boost focus
23 proven ways to boost focus23 proven ways to boost focus
23 proven ways to boost focusEntefy
 
What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...Entefy
 
Inattention: the brain’s complex relationship with social media by Entefy
 Inattention: the brain’s complex relationship with social media by Entefy Inattention: the brain’s complex relationship with social media by Entefy
Inattention: the brain’s complex relationship with social media by EntefyEntefy
 
Patients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyPatients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyEntefy
 
Old school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyOld school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyEntefy
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy
 

More from Entefy (13)

10 Consequences of tech use and abuse
10 Consequences of tech use and abuse10 Consequences of tech use and abuse
10 Consequences of tech use and abuse
 
12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain  12 Ways digital devices are affecting the brain
12 Ways digital devices are affecting the brain
 
11 Tech habits that are bad for your health
11 Tech habits that are bad for your health11 Tech habits that are bad for your health
11 Tech habits that are bad for your health
 
AI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industriesAI’s disruptive impact in 10 industries
AI’s disruptive impact in 10 industries
 
9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now9 disruptive artificial intelligence technologies happening now
9 disruptive artificial intelligence technologies happening now
 
Collected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private dataCollected, bundled, and sold: your sensitive private data
Collected, bundled, and sold: your sensitive private data
 
Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]Data trackers are watching your every move [SLIDES]
Data trackers are watching your every move [SLIDES]
 
23 proven ways to boost focus
23 proven ways to boost focus23 proven ways to boost focus
23 proven ways to boost focus
 
What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...What would professional sports look like with AI referees and other smart tec...
What would professional sports look like with AI referees and other smart tec...
 
Inattention: the brain’s complex relationship with social media by Entefy
 Inattention: the brain’s complex relationship with social media by Entefy Inattention: the brain’s complex relationship with social media by Entefy
Inattention: the brain’s complex relationship with social media by Entefy
 
Patients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by EntefyPatients are about to see a new doctor: artificial intelligence by Entefy
Patients are about to see a new doctor: artificial intelligence by Entefy
 
Old school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by EntefyOld school no more: AI disrupts the classroom by Entefy
Old school no more: AI disrupts the classroom by Entefy
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexity
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Digital security update: 10 cybersecurity and privacy threats

  • 1. 10 CYBERSECURITY & PRIVACY THREATS DIGITAL SECURITY UPDATE:
  • 2. 2ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS These slides provide insight into apps, web services, and devices designed to go unnoticed as they capture your sensitive personal data.
  • 3. 3ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS This presentation was curated by Entefy, the company building the first universal communicator—an AI-powered communication platform that helps you seamlessly interact with the people, services, and smart things in your life.
  • 4. 4ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Anonymous sperm donor received a Facebook friend suggestion to connect with the child born of his donation. Source: https://gizmodo.com/how-facebook-figures-out-everyone-youve- ever-met-1819822691
  • 5. 5ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Mattel scuttled an Internet of Toys product after two Congressmen questioned its use to collect data on children. Source: https://consumermediallc.files.wordpress.com/2017/09/markey-bar- ton-letter-mattel-9-28-17.pdf
  • 6. 6ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS A tech journalist’s Google Home Mini malfunctioned and recorded him 24/7 without his permission. Source: https://www.androidpolice.com/2017/10/10/google-nerfing-home-minis- mine-spied-everything-said-247/
  • 7. 7ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Apple’s Core ML: When more and more apps have access to user data, it’s harder to guarantee privacy and security. Source: https://www.wired.com/story/core-ml-privacy-machine-learning-ios/
  • 8. 8ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS “Permit this app to use your camera?” Hackers can take control of smartphone cameras without opening an app. Source: https://motherboard.vice.com/en_us/article/mb3ezy/iphone-apps-cam- era-permission-pictures-videos-without-you-noticing
  • 9. 9ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS There was a 2,502% increase in malware sales on the Dark Web during 2017. Source: https://cdn.www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Re- port-101117.pdf?utm_source=MIT+Technology+Review&utm_campaign=5e7f9142c5-The_Download&utm_medi- um=email&utm_term=0_997ed6f472-5e7f9142c5-155902325
  • 10. 10ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Up to 2.6M Android phones are infected with the Andorid.Sockbot malware, which adds devices to global botnets. Source: https://www.symantec.com/connect/blogs/android-malware-google-play- adds-devices-botnet-and-performs-ddos-attacks
  • 11. 11ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS Researchers took control of networked computers using malware installed on security cameras. Source: https://www.sciencedaily.com/releases/2017/09/170919160228.htm
  • 12. 12ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS An emergency FDA notice showed that not even pacemakers are safe from hackers. Source: https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm
  • 13. 13ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS A security backdoor was detected in infrastructure software used by 100 global banks and energy companies. Source: https://arstechnica.com/information-technology/2017/08/powerful-backdoor- found-in-software-used-by-100-banks-and-energy-cos/
  • 14. 14ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS The original research in this presentation comes from the Entefy article, “10 cybersecurity and privacy threats that will make you miss Nigerian prince and lottery email scams.”
  • 15. 15ENTEFY 10 CYBERSECURITY AND PRIVACY THREATS About Entefy ©2018 ENTEFY INC. ALL RIGHTS RESERVED. Entefy’s universal communicator is an intelligent communication platform that seamlessly connects the people, services, conversations, contacts, files, apps, smart devices, and smart things in your digital life. contact@entefy.com | www.entefy.com