The Tanium 10: Smart Toys Are Scary | Phishing Success Stories

Susan Nunziata Posted on 07.21.17 — by Susan Nunziata

Welcome to The Tanium 10, our weekly roundup of the news that matters most to security and IT professionals. Each week, we spotlight the 10 stories, trend reports, and research that caught our eye—all to help you keep up with what’s happening in our fast-paced industry. We value your feedback. Once you’ve read this week’s insights, please email me here and tell me what you think.

The Tanium 10

The Tanium 10 for the week ending July 21, 2017:

  1. FBI to consumers: beware of smart toys. The Bureau says people should “consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes” because the sensors, microphones, cameras and other technology could “put the privacy and safety of children at risk.”
  2. Two-step verification is essential—but it’s still not perfect. Google is moving away from single-use codes sent via SMS, instead offering to send prompts that will appear on a user’s smartphone. The reason: hackers have gotten better at taking over mobile phone numbers to receive those codes and break into accounts.
  3. Here are the 10 most successful phishing emails. How many of these have ensnared your employees?
  4. The company behind extramarital dating site Ashley Madison has offered $11.2 million in compensation to users whose personal information was exposed in the high profile 2015 data breach that exposed 36 million accounts.
  5. It’s “all hands on deck” to solve the cybersecurity skills gap that threatens to leave 1.8 million jobs unfilled by 2022. Organizations from AT&T to the Girl Scouts of America are coming up with innovative programs to train the next generation of cybersecurity experts to fill the growing shortage.
  6. Last month, the U.S. Department of Homeland Security announced a bilateral cybersecurity working group with Israel. How did the small Middle East nation become such a global powerhouse in the industry? Here are 6 reasons.
  7. What do data breaches at Verizon and WWE have in common? A misconfigured Amazon server and human error.
  8. According to a new survey, U.S. federal employees frequently use personal laptops and smartphones to access work information, a potentially dangerous breach of protocol. Workers say they have to use unsupported devices to get their jobs done, with 80% reporting that their work-issued devices don’t support applications they need to do their jobs.
  9. Hackers attacked the British Parliament last month, attempting to access accounts 200,000 times in a matter of hours. Go inside the government security response team’s efforts to fight the hackers and keep them out.
  10. Chatbots? Blockchain? Machine learning? These are either the next frontier or some of the most overhyped technologies of 2017.

And another thing…

The ultimate flea market steal: what looked like an old typewriter was actually an original Enigma cypher machine used by the Germans during World War II. The cryptography professor who nabbed the antique for just € 100 auctioned it off last week for € 45,000.
Like what you see? Click here and sign up to receive The Tanium 10 in your inbox every Friday.