This is the Biggest Threat Predictions Security System in 2016

Illustration laptop locked (Credit: Alamy)
The development of technology, more and more assisted and more practical to operate something. But behind the more sophisticated a technology, anyone trying to exploit vulnerabilities such a device, so that it can be manipulated or even controlled remotely.


Quoted from Wired, Sunday (03/01/2016), stated that the year 2016 there will be some threats are lurking computers or gadgets that we have. So roughly, what are the threats that lurk in the year 2016? 

   

Hacking accompanied by extortion


Action indeed can not be denied anymore. Many victims arising from the action, not even cover possible losses in terms of material. A hacker, or fondly called hackers, usually always looking for ways to find vulnerabilities on a device or website, so that they get the proper administrator rights on the device or compromised site. By doing so, the hackers are free to dig up and steal information from the device or website that they infiltrated such as personal photos, important data, and even credit card information.Like what happened to one of the dating site Ashley Madison in August 2015 ago. A group of hackers managed to steal data of users of the dating site Ashley Madison, which number more than 10 million users, of which there are the credit card information. In fact, reportedly, the database had been stolen by a group of hackers has been uploaded to the forum of hacking and sold. From the information circulated, the size of the database that was stolen by the hackers reach 10GB. Even the police reportedly worth 5 billion to compensate for the amount that can find and provide information hacker group's website Ashley Madison.



Attacks are able to transform and manipulate data


Actions of the breaker security system is not expected, since they can be present and strike anytime. Not just once, but many times the attacks are deployed so that they are able to penetrate the security system of a company database, to search for and steal confidential data. But do not just steal, they also manipulate data in the database.
 

Other Interesting Articles :
Laptops that supports Virtual Reality from MSI
Apricity OS, Linux Operating System With Beautiful Design
Gamers child turned out to be more clever and more Easy Catch

Such as manipulating stock data for playing the price, or alter a company's financial data for the sake of particular interest. Or it could just manipulate the control of a weapon with high technology, so abused.
 

 

Awakening zombie botnets on the Internet of Things (IOT)


The development of technology, make it easier for users to connect with other devices. Suppose a car that can be controlled via a smartphone, or use smartwatch that is always connected to the smartphone, and many more.However, from the observations some researchers, it was mentioned that in 2016 the botnet zombies will be present in very large numbers. Not without reason, analysts said that the botnet zombie does not come from any computer, but through a device connected to the Internet network. Eg smartphone, smart TV devices, smartwatch, even CCTV. With a very large number, it is not likely the zombie botnet can perform a Distributed Denial of Service (DDoS) in a very quick time, to cripple a site, such as the site of university campuses, schools, banks, and even government sites. 


Over many backdoor scattered


No doubt that the easiest way to enter a computer is through a backdoor. This problem has been there from the beginning the Internet was introduced. This backdoor is usually inserted in an application that gives the lure. But in an age of sophisticated now, backdoor can also be fitted on a website, to gain access to the database of the site.Not only on the computer, this backdoor can also attack the smartphone with Android operating system. As reported in November 2015 ago, which at the Software Development Kit (SDK) one from Chinese search engine, Baidu, planted a backdoor. Given the name of Wormhole, security experts said that this backdoor can perform some actions without the knowledge of the owner of the smartphone, such as making calls, sending short messages, make new contacts, download and upload files, and even install the application silently.Now about that prediction of threats to the security system which will occur in the year 2016. Hopefully the threat was not
approached yes, so there is no loss arising from acts of hacking.

12 Responses to "This is the Biggest Threat Predictions Security System in 2016"

  1. wah article its good
    Thanks for Share Article

    ReplyDelete
  2. nice post and lanjutkan karyanya.....:)

    ReplyDelete
  3. Good Post Mr ! your article is very Good

    ReplyDelete
  4. Nice article, so we must be carefull and make protection for our gadget or PC system.. thank for shared..

    ReplyDelete
  5. wow nice sharing broo!!!
    keep it up!

    ReplyDelete
  6. Nice post and thanks for sharing

    ReplyDelete
  7. Wow thank for shared, so we can be carefull.

    ReplyDelete
  8. i like your articel. keep it going gan

    ReplyDelete

It would be nice if you want to take a moment to comment on this article.
We would be pleased if you comment.
but commented nicely and politely do not make comments that are spam and OOT (out of topic).
Thank you for your visit if you deign to join this site click the button above. Thank you very much for visiting