Technology is ever changing, and cyber-criminals will be ever adjusting to it. Recently, MIT’s Technology Review published an article pertaining to technology security threats that we should be aware if in 2012. As many of us spend a considerable amount of time online, being aware of these threats can help safeguard valuable data.
Stolen, Spoofed Certificates
One major issue the article focuses on is stole or faked certificates. Certificates are utilized by websites that you log into, like your bank, that prove the site can be trusted. In 2011 the faking of these was a popular strategy employed by cyber-criminals and it is thought to be a continuing problem in 2012.
A Common Security Mechanism in Trouble?
The use of certificates as a security mechanism is the most common method used currently. If the trustworthiness of these are put into question then that will spell trouble for all computer users including large companies who are accountable for protecting confidential data.
Another common security challenge is what is referred to as “Hacktivism”. Cyber-criminals look at this as activism through hacking, hence the name. Organizations like Anonymous and LulzSec target large companies that they believe are guilty of wrongdoing. They also target companies to show the susceptibility and weakness of them. Technology Review believes that groups like these will continue “hacktivism” for a long time.
In 2012 another security risk is the growing popularity of home automation. People connect alarm systems, lights, even locks, to the web to automate their homes. If respected companies are not used or if hackers get into these systems consider the damage that can be done.
Tips for Keeping Your Information Safe While Using Public Wi-Fi – Hi-Tech Hawaii
About Hi-Tech Hawaii, LLC
At Hi-Tech Hawaii, we understand the issues Honolulu small businesses face in attempting to afford, monitor and maintain their IT infrastructure. We offer a range of cost-effective tech support and computer repair services for small and mid-size businesses that will help you save time, safeguard and manage data more efficiently, and increase employee productivity.
- 05/22/2013 Time to break these bad tech habits
- 05/14/2013 Have an iPhone? Watch out for hackers
- 05/11/2013 Is your phone’s passcode really safe?
- 05/11/2013 Not all computer monitors are the same
- 05/03/2013 Sharing your screens on iOS doesn’t have to be a pain
- 05/03/2013 Don’t hurt your peepers at the workplace
- 04/25/2013 Privacy is dead? It doesn’t have to be
- 04/24/2013 Mourning the death of Google Reader
- 04/16/2013 Protect yourself with two-factor authentication
- 04/11/2013 Take the small steps to protect your business from cyber attack