The Top 5 Cyber Security Threats That Could Affect Your Life


The Top 5 Cyber Security Threats That Could Affect Your Life–

Cyber Security : ehack

Cyber Security : ehack

Our electronic devices are such a big part of our lives today that it’s hard to imagine what we once did without them. But our constant use of technology to keep in touch, pay bills, stay on top of the news, shop and research things has a downside: Our data can be exposed to criminals who commit crimes such as identity theft and credit card fraud – unless we take the proper precautions. Our growing reliance on electronic devices is part of the reason why careers in cyber security are growing at a faster pace. Jobs in information security, web development and computer network architecture – three fields at the forefront of cyber security – are expected to grow 22% between 2010 and 2020. Understanding the threats can help everyone do their part to make those jobs easier. Here are five top cyber security threats and tips on how to protect yourself against them, according to experts.

 

1. Malware and Bots

How-to-protect-yourself

If you’ve ever spent a frustrating afternoon calling a help line to tackle a computer virus, then you know how pesky malicious software – or malware, for short – can be. Malware also includes nuisances like spyware, which allows digital hackers to track your every move and to view the passwords you are entering, according to the National Cyber Security Alliance, an organization focused on educating the public about how to use the Internet safely. Typically consumers get tricked into downloading malware by accident, when for instance they click on a rogue website or try to download what seems to be free software, like a screen saver. When criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites, the setup is known as a botnet.

Further, “malware can be spread by your Friends on social networking sites like Facebook,” says, Linda McCarthy, cyber security expert, former senior director of Internet safety at Symantec and author of Own Your Space: Keep Yourself and Your Stuff Safe Online. You need to think about that link your Friend is telling you to click on. Is that really a Friend sending that link, or was their account compromised? Don’t click on suspicious links, McCarthy warns. Spreading malware on social networking sites is growing at an alarming rate. “Even though social networking sites have systems in place to minimize the risk, you are still the first line of defense in protecting yourself. It makes sense that malware writers target social networks because you are likely to trust a link that came from one of your friends,” she says.

2. Spam

You already know that “spam” is the email equivalent of junk mail. But it can do more than clutter up your inbox. Some of these emailHow-to-protect-yourself missives can contain a link or an attachment prompting you to download a computer virus. They can also be used to defraud those close to you. For instance, someone who has hacked into your email account can send a message asking every one of your contacts to wire money because you are in distress – and possibly rope in a few people who aren’t familiar with this common fraud. The CAN-SPAM Act was set up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation.

3.Hacked Accounts

How-to-protect-yourself

One common way for identity thieves to gain control of consumers’ personal information is through digital crimes known as “phishing.” In this practice, fraudsters create an email that looks like it was issued from a legitimate company. They will ask for a recipient’s personal information – like an account number or a password – and then use that information to commit financial crimes, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.

“Phishing scams are successful because they use social engineering techniques to gain your trust,” says McCarthy. For example, one scam claims to be a relative traveling in another country reaching out for your help. It’s an email from your nephew. He was mugged, lost his wallet, and he needs you to wire him money right away. “It’s a natural reaction to want to help someone in trouble. That’s what the phishers count on. Beware of social networking techniques and be sure to protect your accounts,” she adds.

4.Unsecured Home Wireless Networks

How-to-protect-yourselfMany of us have converted to home wireless Internet networks to connect our TVs, smartphones, laptops, computers and tablets. And why not? It’s very convenient. But with these home networks come risks. Without certain protections, cyber criminals in the area may be able to access the Internet through your network and possibly gain access to your computer and other devices.

 

5. Data Gone AWOL

How-to-protect-yourself

Given all of the places where we tote mobile devices such as laptops, tablets and smartphones, it becomes very easy to lose them. If the data on those devices falls into the wrong hands and isn’t properly protected through techniques like encryption (the process of masking information using an algorithm, so that it becomes unreadable), it can be a field day for cybercriminals. It’s not just consumers who lose data. Forty-five percent of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich., that is dedicated to consumer privacy, data protection and information security policy. Even use of YouSendIt, Dropbox and other Internet-based file-sharing tools by employees – now a common phenomenon – raise the risk that confidential corporate data will be leaked, according to Ponemon.

But even if devices don’t get lost, it’s possible that in using them we’ll fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café.

“With all of your devices and more to come, be sure to have a backup strategy,” advises McCarthy. Many of the security software packages now include backup as an option. That won’t help with all of the data on every device, so be sure you plan and back up all of your important devices. There’s no telling what types of devices will be part of our lives years from now. The tech explosion presents immense opportunity for those with the creativity and know-how to make the gadgets we use better and better – and to simply keep them running smoothly. In the meantime, building a few smart cyber security habits is a good way for all of us to enjoy the technology we use every day with few hassles.

Advances in technology are not likely to slow down in the future, nor is our increased reliance on the fruits of that growth. New security threats will be a constant reality, which makes it more important than ever that skilled individuals step up to fill the increasing number of jobs available in cyber security, and that those who choose other career paths take steps to protect their own security.

 

Original Post at http://www.devry.edu/know-how/top-5-cyber-security-threats-that-could-affect-your-life/

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

Advertisements

Posted on December 23, 2012, in cyber crime, ehacking, hacking, phishing, privacy, security and tagged , , , , . Bookmark the permalink. 41 Comments.

  1. 360564 588700Spot on with this write-up, I actually suppose this internet web site needs rather a lot more consideration. most likely be once a lot more to learn significantly a lot more, thanks for that information. 710918

  2. please keep with this pace, i am going to follow all of your blogs.

  3. Hey’a just wanted to give you a brief heads up and let you know a few of the pictures aren’t loading properly. I’m not sure why but I think its a linking issue. I’ve tried it in two different web browsers and both show the same results.

  4. A thoughtful opinion and guidelines I’ll use on my internet page. You’ve naturally spent some time on this. Effectively carried out!

  5. Thanks for this wonderful post! It has long been very helpful. I wish that you’ll carry on posting your wisdom with us.

  6. Definitely value bookmarking for revisiting. I wonder how much attempt you set to create this sort of wonderful informative web site.

  7. Some genuinely good and utilitarian information on this internet internet site , likewise I believe the style and style contains superb attributes.

  8. Hey, you used to write amazing, but the last several posts have been kinda boring. I miss your tremendous writings. Past couple of posts are just slightly bit out of track! come on!

  9. excellent post. Never knew this, thanks for letting me know.

  10. This is going to be a terrific internet internet site, will you be involved in performing an interview regarding how you developed it? If so e-mail me!

  11. cool thanks for reis posting! btw are there feeds to your weblog? I’d enjoy to add them to my reader

  12. I’m not that a lot of a internet reader to be honest but your blogs truly nice, keep it up! I’ll go ahead and bookmark your website to come back within the future. All the greatest

  13. Wow! This could be one particular of the most helpful blogs We’ve ever arrive across on this subject. Actually Great. I’m also an expert in this topic therefore I can understand your hard work.

  14. It’s perfect time to make some plans for the future and it’s time to be happy. I’ve read this post and if I could I wish to suggest you some fascinating issues or suggestions. Perhaps you could write next articles referring to this write-up. I want to read even much more issues about it!

  15. Wow What excellent details. Thank you for the time you spent on this post.

  16. Enjoyed reading this, very good stuff, appreciate it.

  17. Some genuinely marvellous work on behalf of the owner of this web site, utterly outstanding content.

  18. This is a great common sense write-up. Extremely useful to one who is just discovering the resouces about this part. It will definitely assist educate me.

  19. This style is spectacular! You naturally know how to maintain a reader amused. Between your wit and your videos, I was almost moved to start my own weblog (effectively, almost. HaHa!) Amazing job. I genuinely enjoyed what you had to say, and far more than that, how you presented it. Too cool!

  20. I discovered your weblog internet site on google and examine quite a few of your early posts. Continue to sustain up the superb operate. I basically extra up your RSS feed to my MSN News Reader. In search of forward to reading far more from you later on!

  21. Thank you for sharing with us, I believe this internet site genuinely stands out : D.

  22. You are the top, It is posts like this that maintain me coming back and checking this internet site regularly, thanks for the information!

  23. Some genuinely prime posts on this website , bookmarked .

  24. It is rare knowledgeable folks within this subject, nevertheless, you appear like there’s far more you are talking about! Thanks

  25. I simply want to mention I am just new to blogging and site-building and certainly loved this web site. Likely I’m going to bookmark your blog post . You really have remarkable stories. Kudos for revealing your web site.

  26. You produced some decent points there. I looked online towards the concern and discovered a lot of people is going in addition to employing your internet site.

  27. Great Page Got Here. Very Interesting Subject For A Website Keep Up The Interesting Work!. Check Out Samsung Tablet & Galaxy Tab 11.6 Release Date Weblog Tell Me What You Think!

  28. This really is excellent content material. You’ve loaded this with valuable, informative content material that any reader can realize. I enjoy reading articles that are so really well-written.

  29. Most what i read online is trash and copy paste but i feel you offer something different. Maintain it like this.

  30. Some genuinely excellent information , Gladiola I detected this.

  31. Keep functioning ,remarkable job!

  32. Excellently written write-up, doubts all bloggers offered exactly the same content material because you, the internet can be a greater location. Please maintain it up!

  33. Impressive how pleasurable it is to read this blog.

  34. Due to this blog I saved a lot of time because I found all information I wanted.

  35. I’m amazed. This blog is excellent.

  36. Appreciating the persistence you put into your blog and detailed information you provide. It’s nice to come across a blog every once in a while that isn’t the same unwanted rehashed information. Great read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.

  37. Hi there! I just wanted to ask if you ever have any issues with hackers? My last blog (wordpress) was hacked and I ended up losing a few months of hard work due to no back up. Do you have any methods to stop hackers?

  38. I’m amazed. This blog is excellent.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: