"While you are looking at the brightness of the sun you should always pay heed to the shadow growing behind you."
As the information technology industry is growing at a rate never seen before there are ever increasing attacks bring faced each hour.
There was a time when Hackers used to be the nerd equivalent of charming rogues with simple algorithms to wreak havoc primarily for the bragging rights but today hacking is a big business. they are equipped with most advanced technology to steal or extort huge sums of money and bring down businesses.
The most common threats faced due to maliciousness of the hackers are:
As wikipedia explains it , phishing is the attempt to acquire sensitive information such as usernames,passwords and credit card details (and sometimes ,indirectly , money), often by malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Tomorrow’s phishing attempts will be so sophisticated and realistic that Sherlock Holmes wouldn’t detect a whiff of deceit.
2. Internet Of Things (IoT)
Isn't Internet Of Things loved by all of us?
The idea of having our cars, desktops,appliances and home security systems linked to our mobile devices. The problem is that these connected systems create new entry points for hackers to penetrate.
Nothing is in penetrable , hackers sit around whole day figuring out how to penetrate or use an access point. Just like resource (like printer) sharing among various computers can be hacked easily .
What if hackers turn all the tools and the security measures we are using to protect our data or everything else ,against us?
What if bio metrics like thumbprints on our smartphones and voice recognition to start our cars ( which actually are really cool ) are duplicated by hackers?
won't we be helpless?
4. Brute Force Attacks
Encryption of sensitive, proprietary and personal information is supposed to be a the best way to keep it safe even if the data is hacked. But is it?
Recently hackers would use a technique called `brute force,’ trying every possible decryption key to get at the meaning of encrypted data.
5. Location Spoofing
If data packets or email is coming from a region generally known to be used by hackers for their malicious purpose and you don't have any kind of business there , it may be a phishing scam.
But recently , hackers have mastered the act of providing a cyber security analyst with spoofed locations . Analyst may think the email is coming from location 1 while actually it is coming from location 2.