Technology is always changing and adapting. So, unfortunately, are cyber-criminals. MIT’s Technology Review website recently presented its list of the biggest technology security hazards of 2012. If you spend much of your life surfing the web or communicating with your friends through social media sites, you should be interested in this list. Knowing what’s on it can protect you and your computer in 2012.
Stolen, Spoofed Certificates
One serious problem the article concentrates on is stole or faked certificates. Certificates are utilized by websites that you log into, like your bank, that prove the site can be trusted. In 2011 the faking of these was a common strategy used by cyber-criminals and it is thought to be a continuing problem in 2012.
A Common Security Mechanism in Trouble?
The use of certificates as a security mechanism is the most common method used currently. If the trustworthiness of these are put into question then that will spell trouble for all computer users including large companies who are in charge of protecting sensitive data.
Technology Review also pointed to online attacks referred to as “hacktivism” as a key security challenge for this year. Organizations such as Anonymous and LulzSec crack passwords and break into company websites. Commonly, these groups do so to show that companies are woefully unprepared to deal with hackers. Sometimes, they target companies or businesses that they believe are guilty of wrongdoing. No matter the motivation, expect these groups to continue their so-called hacktivism in 2012 and beyond.
The growing popularity of home automation also presents security risks in 2012. As Technology Review writes, a growing amount of automation systems connect security systems, thermostats, lights, and in some cases the locks to homes’ front doors to the web. Imagine the damage that hackers can do should they break into these systems.
Tips for Keeping Your Information Safe While Using Public Wi-Fi – ServerLogic
ServerLogic helps small and medium sized businesses get the most from their technology investments. We believe that technology, when properly deployed and supported should enable you to reach your goals.
- 05/23/2013 Living Social password breach should change your bad online habits
- 05/22/2013 Guilty of these bad tech habits?
- 05/14/2013 Hackers love the iPhone
- 05/09/2013 Think all LCD monitors are the same? Think again
- 05/08/2013 How much protection does your phone’s passcode really provide?
- 05/02/2013 Don’t strain your eyes while at work
- 05/01/2013 You can easily share your screen with iOS
- 04/25/2013 You can protect your privacy
- 04/24/2013 Why did Google Reader have to die?
- 04/16/2013 Stop hackers with two-factor authentication