"While you are looking at the brightness of the sun you should always
pay heed to the shadow growing behind you."
As the information technology industry is growing at a rate never seen
before there are ever increasing attacks bring faced each hour.
There was a time when Hackers used to be the nerd equivalent of charming
rogues with simple algorithms to wreak havoc primarily for the bragging rights
but today hacking is a big business. they are equipped with most advanced
technology to steal or extort huge sums of money and bring down businesses.
The most common threats faced due to maliciousness of the hackers are:
1. Phishing
As wikipedia explains it , phishing is the attempt to acquire sensitive
information such as usernames,passwords and credit card details (and sometimes
,indirectly , money), often by malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
Tomorrow’s phishing attempts will be
so sophisticated and realistic that Sherlock Holmes wouldn’t detect a whiff of
deceit.
2. Internet Of Things (IoT)
Isn't Internet Of Things loved by all of us?
The idea of having our cars, desktops,appliances and home security systems
linked to our mobile devices. The problem is that these connected systems
create new entry points for hackers to penetrate.
Nothing is in penetrable , hackers sit around whole day figuring out how to
penetrate or use an access point. Just like resource (like printer) sharing among various computers can be
hacked easily .
3. Duplication
What if hackers turn all the tools and the security measures we are using
to protect our data or everything else ,against us?
What if bio metrics like thumbprints on our smartphones and voice
recognition to start our cars ( which actually are really cool ) are duplicated
by hackers?
won't we be helpless?
4. Brute Force Attacks
Encryption of sensitive, proprietary and personal information is supposed
to be a the best way to keep it safe
even if the data is hacked. But is it?
Recently hackers would use a technique called `brute force,’ trying every
possible decryption key to get at the meaning of encrypted data.
5. Location Spoofing
If data packets or email is coming from a region generally known to be used
by hackers for their malicious purpose and you don't have any kind of business
there , it may be a phishing scam.
But recently , hackers have mastered the act of providing a cyber security
analyst with spoofed locations . Analyst may think the email is coming from location 1 while actually it is
coming from location 2.