<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercrime Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Wed, 07 Feb 2018 22:50:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Malware Report Sheds Light on Underreported Cybercrimes</title>
		<link>https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 07 Feb 2018 22:24:06 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5688</guid>

					<description><![CDATA[<p>A New York Times <a href="https://www.nytimes.com/2018/02/05/nyregion/cyber-crimes-unreported.html?hp&#38;action=click&#38;pgtype=Homepage&#38;clickSource=story-heading&#38;module=second-column-region&#38;region=top-news&#38;WT.nav=top-news">report</a> revealed that law enforcement investigating cybercrimes can face many challenges including incomplete data, outdated statistical categories, and a lack of funding for cyber divisions. These problems hinder the solving of not just digital crimes, but...</p>
<p>The post <a href="https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/">Malware Report Sheds Light on Underreported Cybercrimes</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-full wp-image-5690" src="https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03.jpg" alt="cybercrime malware report" width="800" height="558" srcset="https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03.jpg 800w, https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03-300x209.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03-768x536.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" />A <em>New York Times</em> <a href="https://www.nytimes.com/2018/02/05/nyregion/cyber-crimes-unreported.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=second-column-region&amp;region=top-news&amp;WT.nav=top-news">report</a> revealed that law enforcement investigating cybercrimes can face many challenges including incomplete data, outdated statistical categories, and a lack of funding for cyber divisions. These problems hinder the solving of not just digital crimes, but of real-world crimes with a cyber aspect — such as illegal Fentanyl sales distributed through the dark web.</p>
<p>An illustrative example is the &#8220;cheating husband&#8221; scheme. Swindlers compose a message that threatens to expose a husband&#8217;s infidelities unless a ransom is paid. The scammers send the email to thousands of people, hoping to find a guilty and gullible victim among them. Unfortunately for the police, people who fall prey to these schemes rarely report the crime due to embarrassment. In this particular instance, one of the targets of the scheme contacted the Nashville Police Department.</p>
<p>However, even when victims report these crimes, local police departments don&#8217;t have a method of tracking or warning other jurisdictions about them. The FBI created the <a href="https://www.ic3.gov/default.aspx">Internet Crime Complaint Center</a> in 2000, but Donna Gregory, who heads the center, admitted only about 10 percent of cybercrimes are ever reported.</p>
<p>To make reporting easier and more uniform, the National Academies of Sciences, Engineering, and Medicine are currently working to modernize local and federal crime-classification systems. The hope is that with better data, local police departments and the FBI will be able to better address cybercrimes.</p>
<h2>Cybersecurity companies can offer greater insight into the world of internet crime.</h2>
<p>Law enforcement agencies may be overwhelmed by the breadth of digital crimes occurring, but IT security firms must stay ahead of hackers to remain in business. Their daily interactions in detecting and stopping attacks leaves them with a trove of valuable data.</p>
<p>Malwarebytes recently released their <a href="https://blog.malwarebytes.com/malwarebytes-news/2018/01/presenting-malwarebytes-labs-2017-state-of-malware-report/">2017 fourth quarter report</a> on the evolving tactics and techniques of hackers. The report detailed shifting but unrelenting threats from cybercriminals. For instance, after the <a href="https://datarecovery.com/rd/2017-ransomware-recap/">major ransomware attacks</a> last year, development and distribution of that particular type of malware slowed. In its place, attackers deployed spyware, banking trojans, and hijackers — all of which are designed to steal sensitive data and distribute more malware.</p>
<h2>Mining has increased as cryptocurrency grows in popularity and value.</h2>
<p>Bitcoin and a multitude of newer digital currencies have received increasing media attention as their prices skyrocketed and then crashed. While the cryptocurrency market has lost about half of its value since mid-December, many investors see this as a simple correction due to overzealous buyers late last year. Cryptocurrency is here to stay, and there is money to be made from it.</p>
<p>Of course, that means cybercriminals are getting in on the game. Sophisticated hackers have found vulnerabilities in cryptocurrency code to steal vast sums of digital money. That&#8217;s what happened to Japan&#8217;s CoinCheck, which was taken for $534 million in a <a href="https://www.forbes.com/sites/adelsteinjake/2018/02/02/japanese-authorities-continue-investigation-into-534m-cryptocurrency-heist-raid-coincheck/#7dc2a62f1836">late-January heist</a>.</p>
<p>However, there&#8217;s a more mundane way of making cryptocash that&#8217;s on the rise — mining. Cryptomining occurs when people volunteer computing power to a cryptocurrency&#8217;s network. In exchange for running software that validates transactions, miners occasionally earn coins. Hackers have invented a method called drive-by mining to receive the rewards of cryptomining while using unwilling victims to provide the computing power.</p>
<p>These drive-by mining programs can run on a computer without the victim ever knowing it (except for seeing a decrease in computer speed). Malwarebytes claims to have blocked over 100 million drive-by mining attempts in a single month, which means this is a major new threat for security firms.</p>
<h2>The report&#8217;s 2018 predictions indicate that consumers and businesses must remain vigilant.</h2>
<p>Malwarebytes believes that drive-by cryptocurrency mining will continue as long as digital currencies keep their value. The security firm also warns that hackers could use the Internet of Things to mine cryptocurrency as well as perpetrate DDOS attacks. Finally, the report&#8217;s authors believe the use of leaked exploit codes in 2017 will continue this year unless the governments who discover the vulnerabilities begin disclosing them.</p>
<p>The ever-shifting tactics of hackers shows how hard of a job the National Academies of Sciences, Engineering, and Medicine have in codifying a classification system for cyber-attacks. However, without recording and sharing this information in a formalized way, law enforcement will continue struggling to keep up with cybercriminals.</p>
<p>The post <a href="https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/">Malware Report Sheds Light on Underreported Cybercrimes</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</title>
		<link>https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Thu, 25 Jan 2018 17:32:55 +0000</pubDate>
				<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5672</guid>

					<description><![CDATA[<p>Cybercriminals are embracing alternative cryptocurrencies due to a multitude of concerns over bitcoin. Bitcoin&#8217;s newfound popularity has led to booming and busting prices, higher transaction fees, and longer wait times to confirm transactions. Harder-to-trace and cheaper-to-use digital currencies such as...</p>
<p>The post <a href="https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/">Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Cybercriminals are embracing alternative cryptocurrencies due to a multitude of concerns over bitcoin. Bitcoin&#8217;s newfound popularity has led to booming and busting prices, higher transaction fees, and longer wait times to confirm transactions. Harder-to-trace and cheaper-to-use digital currencies such as monero have subsequently seen an increase in popularity.</span></p>
<h2>Bitcoin price fluctuations have made setting ransom demands difficult.</h2>
<div id="attachment_5673" style="width: 350px" class="wp-caption alignright"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-5673" class="wp-image-5673" src="https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart.jpeg" alt="Graph of bitcoin price fluctuation." width="340" height="170" srcset="https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart.jpeg 800w, https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart-300x150.jpeg 300w, https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart-768x384.jpeg 768w" sizes="auto, (max-width: 340px) 100vw, 340px" /><p id="caption-attachment-5673" class="wp-caption-text">The price of bitcoin has fluctuated wildly, spooking investors and frustrating cybercriminals.</p></div>
<p><span style="font-weight: 400;">In the past month, the </span><a href="https://www.coindesk.com/price/"><span style="font-weight: 400;">price of bitcoin</span></a><span style="font-weight: 400;"> has yo-yoed from $13,000 to $17,000 and then back down to $10,000. These fluctuations make it difficult for hackers to demand a precise ransom. In fact, the price of bitcoin has become so unreliable, </span><a href="https://www.theguardian.com/technology/2018/jan/18/bitcoin-fluctuations-ransomware-cybercrminals-malware-developers"><span style="font-weight: 400;">hackers are increasingly pricing their ransoms</span></a><span style="font-weight: 400;"> in US dollars (though the payments are still frequently requested in bitcoin).</span></p>
<p><span style="font-weight: 400;">And a fluctuating price isn&#8217;t the cryptocurrency&#8217;s only problem. </span><span style="font-weight: 400;">Gabriel Glusman, senior cyber intelligence analyst at Sixgill, </span><a href="http://www.zdnet.com/article/ransomware-why-the-crooks-are-ditching-bitcoin-and-where-they-are-going-next/"><span style="font-weight: 400;">told ZDNet</span></a><span style="font-weight: 400;">, &#8220;</span><span style="font-weight: 400;">the time it takes for transactions to confirm, the high volume, and the transaction fees makes it that anything that&#8217;s less than $200 isn&#8217;t worth paying in bitcoin.&#8221; </span><span style="font-weight: 400;">These problems have spurred hackers to look for alternate forms of payment.</span></p>
<h2>The takedown of dark websites AlphaBay and Hansa has cybercriminals worried about cryptocurrency anonymity.</h2>
<p><span style="font-weight: 400;">A joint effort by the U.S. Department of Justice and Europol </span><a href="http://www.zdnet.com/article/u-s-department-of-justice-europol-tout-alphabay-takedown-but-keenly-aware-challenges-remain/"><span style="font-weight: 400;">took down AlphaBay</span></a><span style="font-weight: 400;">, a website that hosted listings for illegal drugs, stolen and fraudulent documents, firearms, and other illicit products. Once the site was shuttered, criminals flocked to another dark website, Hansa.</span></p>
<p><span style="font-weight: 400;">Unfortunately for the criminals who created Hansa accounts, the site had already been seized by Dutch officials. International law enforcement agencies silently recorded the criminal activity taking place on Hansa. </span><span style="font-weight: 400;">&#8220;They flocked to Hansa in their droves,&#8221; </span><a href="https://www.wired.com/story/alphabay-hansa-takedown-dark-web-trap/"><span style="font-weight: 400;">Interpol director Rob Wainwright</span></a><span style="font-weight: 400;"> told </span><i><span style="font-weight: 400;">Wired</span></i><span style="font-weight: 400;">. &#8220;We recorded an eight-times increase in the number of new users on Hansa immediately following the takedown of AlphaBay.&#8221;</span></p>
<p><span style="font-weight: 400;">The closures of AlphaBay and Hansa have spooked some cybercriminals into seeking currencies with more privacy protections than bitcoin. Wainwright tweeted a warning that, &#8220;</span><span style="font-weight: 400;">We’ll see a progressive shift in 2018 towards criminal use of cryptocurrencies other than Bitcoin, making it generally more challenging for law enforcement to counter.&#8221;</span></p>
<h2>Monero has a growing share of the cryptocurrency market.</h2>
<p><span style="font-weight: 400;">The alt-coin launched in 2014 and focuses on being untraceable, which has made it popular for ransomware distributors. Matt Suiche, founder of Comae Technologies </span><a href="https://www.bloomberg.com/news/articles/2018-01-02/criminal-underworld-is-dropping-bitcoin-for-another-currency"><span style="font-weight: 400;">told Bloomberg</span></a><span style="font-weight: 400;"> that monero is now &#8220;one of the favorites, if not the favorite&#8221; cryptocurrency of ransomware attackers.<img loading="lazy" decoding="async" class="alignright wp-image-5675" src="https://datarecovery.com/wp-content/uploads/2018/01/logo.png" alt="Monero Cryptocurrency Logo" width="334" height="176" srcset="https://datarecovery.com/wp-content/uploads/2018/01/logo.png 1200w, https://datarecovery.com/wp-content/uploads/2018/01/logo-300x158.png 300w, https://datarecovery.com/wp-content/uploads/2018/01/logo-768x404.png 768w, https://datarecovery.com/wp-content/uploads/2018/01/logo-1024x539.png 1024w" sizes="auto, (max-width: 334px) 100vw, 334px" /> </span></p>
<p><span style="font-weight: 400;">Monero transaction fees (like those of bitcoin) are not fixed, but they have been <a href="https://bitinfocharts.com/comparison/transactionfees-btc-xmr.html#3m">significantly lower</a> than bitcoin&#8217;s on average.</span><span style="font-weight: 400;"> Monero also has </span><a href="https://www.monero.how/how-does-monero-privacy-work"><span style="font-weight: 400;">many more features</span></a><span style="font-weight: 400;"> to ensure anonymity than bitcoin (though some transactions from between 2014 and 2016 </span><a href="https://cointelegraph.com/news/monero-transactions-history-can-be-revealed-and-exposed-research"><span style="font-weight: 400;">may be traceable</span></a><span style="font-weight: 400;">). </span></p>
<p><span style="font-weight: 400;">While monero&#8217;s developers aren&#8217;t advocating for criminals to use it, they admit that it is well-suited for illegal transactions. Riccardo Spagni, a core developer for the alt-coin told Bloomberg, &#8220;I imagine that monero provides massive advantages for criminals over bitcoin, so they would use [it].&#8221;</span></p>
<h2>Another attractive currency for use on the dark web is Dash.</h2>
<p><span style="font-weight: 400;">The alt-coin, whose name is a portmanteau of &#8220;digital cash,&#8221; may have an even brighter future than monero. It has extremely low transaction fees (they aren&#8217;t fixed, but are generally less than $1) and an </span><a href="https://dashpay.atlassian.net/wiki/spaces/DOC/pages/1146928/InstantSend"><span style="font-weight: 400;">InstantSend function</span></a><span style="font-weight: 400;"> that completes transactions in as little as a few seconds. Dash also has a feature called PrivateSend that makes it attractive to those looking to do untraceable deals.</span></p>
<p><span style="font-weight: 400;">Dash received media attention after inking a deal with Kuvacash, a project aiming to stabilize Zimbabwe&#8217;s runaway inflation. The </span><a href="http://www.businessinsider.com/dash-price-new-high-november-22-reddit-rumours-2017-11"><span style="font-weight: 400;">$550,000 partnership</span></a><span style="font-weight: 400;"> led to a steady increase in the coin&#8217;s price until an abrupt nosedive with most other cryptocurrencies in mid-January. Still, if the coin achieves mainstream popularity, it will be very attractive to cybercriminals looking for a good blend of ease-of-use and increased privacy.</span></p>
<h2>Ransomware may embrace new currencies, but it&#8217;s not going away any time soon.</h2>
<p><a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/"><span style="font-weight: 400;">Hancock Health</span></a><span style="font-weight: 400;"> and </span><a href="https://www.csoonline.com/article/3250246/security/allscripts-recovering-from-ransomware-attack-that-has-kept-key-tools-offline.html"><span style="font-weight: 400;">Allscripts</span></a><span style="font-weight: 400;">, an electronic health record company, have both suffered costly ransomware attacks in January 2018. Last year saw </span><a href="https://datarecovery.com/rd/schools-non-profits-local-governments-medical-centers-hit-ransomware-2017/"><span style="font-weight: 400;">ransomware cripple dozens</span></a><span style="font-weight: 400;"> of organizations and businesses as IT departments scrambled to keep up. That is to say, bitcoin&#8217;s price may fluctuate, but ransomware attacks remain a constant.</span></p>
<p><span style="font-weight: 400;">Cybercriminals fleeing the bitcoin market does not necessarily mean that law-abiding consumers will, too. However, some of bitcoin&#8217;s issues, like hefty transaction fees and long confirmation times, extend to everyone who uses it. Other cryptocurrencies like monero and Zcash hope to capture a larger market share due to enhanced privacy features. </span></p>
<p><span style="font-weight: 400;">Whichever form wins out in the end, there is a demonstrated appetite for cryptocurrency — the current market cap stands at over $500 billion. Our only advice is that if you decide to invest in one of these new alt-coins, don&#8217;t choose </span><a href="https://blog.fortinet.com/2018/01/22/spritecoin-another-new-cryptocurrency-or-not"><span style="font-weight: 400;">SpriteCoin</span></a><span style="font-weight: 400;"> — it&#8217;s a disguised ransomware that will encrypt your files and demand 0.3 monero. </span></p>
<p>The post <a href="https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/">Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Still a Major Issue for the Internet of Things</title>
		<link>https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 22:46:50 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5651</guid>

					<description><![CDATA[<p>Early last year, <a href="https://datarecovery.com/rd/ransomware-2017-expectations/">we warned that the Internet of Things</a> (IoT) had major security vulnerabilities, and it was a matter of time until hackers targeted it. And while smart devices have largely evaded ransomware attacks (though <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/#17d14ca4425c">some IoT devices</a> were...</p>
<p>The post <a href="https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/">Cybersecurity Still a Major Issue for the Internet of Things</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Early last year, <a href="https://datarecovery.com/rd/ransomware-2017-expectations/">we warned that the Internet of Things</a> (IoT) had major security vulnerabilities, and it was a matter of time until hackers targeted it. And while smart devices have largely evaded ransomware attacks (though <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/#17d14ca4425c">some IoT devices</a> were hit as collateral damage in the WannaCry attack in May), it&#8217;s not because of improved security. More likely, it&#8217;s because hackers haven&#8217;t figured out how to make it profitable yet. Unfortunately, that may not be the case for long.</p>
<h2>What is the Internet of Things?</h2>
<p>The IoT refers to devices — think appliances, cars, and HVAC systems — that connect to the internet. These devices often have &#8220;smart&#8221; as a prefix and offer convenient and futuristic features like the ability to turn up the heat or AC just before you head home from work.</p>
<p>Smart watches, which display emails, monitor heart rate, and even tell golfers how far they are from the pin, are one of the most popular IoT gadgets. But there plenty of lesser known smart devices as well. Coffee makers, thermostats, and light bulbs are increasingly offering connectivity to the internet as a feature.</p>
<p>Unfortunately, the connectivity that allows consumers to control appliances remotely also exposes devices to malware. And that brings us to the crux of why the IoT will likely become a more frequent target of ransomware attacks.</p>
<h2>IoT continues growing, but security is still lax.</h2>
<p>The IoT has grown in fits and starts through 2017. For the <a href="http://www.zdnet.com/article/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time/">first time in history</a>, there are more connected devices (approximately 8.4 billion) than humans (approximately 7.6 billion) on the planet. That being said, <a href="http://www.zdnet.com/article/cisco-most-iot-projects-are-failing-due-to-lack-of-experience-and-security/">Cisco estimates that 75 percent</a> of all IoT projects are failing due to problems with security and lack of compatibility.</p>
<p>These security issues will become a major issue as consumers and industry grow accustomed to the benefits of connectivity. The more people rely on connected devices, the more vulnerable to ransomware they become. After all, successful ransomware attacks depend on the victim feeling like they have no choice but to pay the ransom.</p>
<h2>IoT ransomware would look different than the attacks we&#8217;ve seen lately.</h2>
<p>In general, smart devices are highly specialized and quite different from desktop computers. They don&#8217;t store family photos or business files, and many don&#8217;t have a screen to display a ransom note. Still, enterprising hackers could find a way to freeze or take control of devices and demand a payment.</p>
<p>At the Def Con hacking conference, two researchers demonstrated how they could <a href="https://www.iotsecurityfoundation.org/the-iot-ransomware-threat-is-more-serious-than-you-think/">infect a thermostat</a> with ransomware. If hackers targeted a hospital or nursing home and cranked the heat during summer or AC during winter, victims would have to consider paying the ransom.</p>
<p>If hackers successfully targeted even more critical equipment in a medical facility, the stakes would be even higher. <a href="http://www.computerweekly.com/news/450400567/Poor-IoT-security-could-take-down-power-grid-warns-researcher">Several researchers</a> have warned that U.S. <a href="https://www.cfr.org/report/cyberattack-us-power-grid">power grids are vulnerable</a> due to poor IoT security. These are some of the reasons why <a href="https://techcrunch.com/2015/10/24/why-iot-security-is-so-critical/">so many people</a> are <a href="https://www.techadvisor.co.uk/feature/security/iot-gets-more-more-attractive-ransomware-3665400/">urging IoT manufacturers</a> to take security more seriously.</p>
<h2>Consumers can take precautions right now to protect IoT devices.</h2>
<p>For starters, don&#8217;t keep the default password and don&#8217;t make the new one &#8220;123456&#8221; or something else that is easy to guess. Always update your smart devices when a patch becomes available (just like you should with your computer and phone).</p>
<p>Consumers should make sure devices are operating on a secured Wi-Fi router and not an open wireless connection. Buying devices from companies that have a good cybersecurity track record is also helpful. Here&#8217;s <a href="https://www.ic3.gov/media/2015/150910.aspx">more information from the FBI</a> on how to protect your devices from hacking. As for industrial and government systems, we hope they listen to Cisco CTO Kevin Bloch <a href="https://www.rfglobalnet.com/doc/success-and-peril-as-the-internet-of-things-haul-trillions-into-global-economy-0001">when he says</a>, &#8220;If you don&#8217;t secure it, don&#8217;t connect it.&#8221;</p>
<p>The post <a href="https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/">Cybersecurity Still a Major Issue for the Internet of Things</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 76/106 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:07:38 by W3 Total Cache
-->