Five ways your apps are putting you at risk

Image: Shutterstock

(3) Tumbling hacks

The recent publication of LinkedIn’s breached database of usernames and passwords has set off a swathe of tumbling hacks. Tumbling hacks rely on the fact that most people reuse passwords – depending on who you ask between a half and a two-thirds of people will reuse a password across multiple cloud apps.

Once a criminal knows a username and password for one site, they can try their luck on all the other common sites. The recent LinkedIn breach has seen follow on attacks to Twitter, GitHub, and GoToMyPC.

(4) Cloud backups

Cloud storage is a fantastic way to access data across multiple devices, as well as a quick and easy backup system. But the answer to “What’s the worst that could happen?” is someone accidentally deleting the folders on the website, and this deletion syncing to every device.

Aside from accidental deletions, having all the data in one central place means that if your cloud storage account gets hacked, criminals can copy the data, delete the central source, and then hold your data to ransom.

Read more on enterprise apps:

(5) Dodgy apps

These days it’s pretty easy to make an app or a website. This means that things like those little flashlight apps for your phone can actually be doing a lot of scary stuff.

People generally don’t pay much attention to the permissions the app requires, particularly when it’s something as basic as a flashlight, and give cyber criminals access to the whole device.

Researchers recently found malware in more than a hundred apps on the Android-based Google Play store, so it’s easy to download. We instinctively trust Google, so the presence of the app on the store implies that it’s safe but it isn’t, and more vigilance is needed.

Ed Macnair is CEO at CensorNet

Inside out: How the real threat to your company’s security lies within.

Share this story

Send this to a friend