9. โข Network hacking
๏Sony PlayStation Network hack
Accounts of 77 million people affected
โข Clickjacking scams
๏Facebook
Links to videos takes the user to fake page
asking for login credentials to see the video.
Once the user enters, criminals get the access.
11. โข Cross-site scripting attacks:
๏15 million cyber attacks were reported.
๏450,000 yahoo user names and password were stolen.
โข Data Breech:
๏NASA laptop containing personal information of 10,000 employees
was stolen.
๏No data was encrypted.
โข By the end of 2012, cross site request forgery and SQL injections became
the most commonly used attacks.
12. โข Malware attacks:
๏Source of target- emails containing malicious attachments.
๏Installed software's like crypto locker.
โข Data theft and leakage:
๏Edward Snowden, the former contractor of NSA, leaked information
to Chinese government claiming US government has hacked Chinese
telecommunication companies.
โข More than 50 biggest bank websites were targeted.
13. โข Unauthorized access through Heartbleed and Shellshock:
๏Targets information protected by SSL.
๏Became a major threat for all companies.
๏Will continue to be a threat for coming years.
โข Data Breach:
๏ Hackers attacked Target stealing 56 million credit and debit card
details.
๏ Company suffered huge losses.
14. โข Mobiles becoming a target:
๏Wirelurker malware is targeting iOS devices.
๏Phishing attacks on mobiles.
โข Social media becoming a target:
๏Malicious links hidden in Facebook videos.
โข Attack on Internet of Things(IOT):
๏Hackers are now targeting SMART TVโs, routers & biometric devices.
15. โข Website server software must be always up to date
โข Think twice before you click or download
โข Donโt rely on free wifi
โข Never share your account details
โข Donโt believe any email
โข Install software's from known sources
โข Avoid common passwords like 12345.
โข Encrypt all data.
16.
17.
18. Technology is an endless universe, if we will find a solution to one
threat, there will be five new threats arising. So be alert and think twice
before your actions.
19. โข ACORN 2015, ACORN Snapshot, Australian Cybercrime online reporting network, viewed on 24
August 2015, <https://acorn.govspace.gov.au/files/2015/03/ACORN-Infographic-Jan-to-
Mar2.pdf>.
โข How to Prevent Cybercrime and Identify Theft โ Youtue 2015, viewed 23 September 2015,
<https://www.youtube.com/watch?v=FrvFT89QV5Y>.
โข Paoli, L 2014, The Oxford Handbook of Organized Crime, Oxford University Press, Oxford.
โข Real Business 2015, The 10 biggest cyber crimes of 2011, Real Business, viewed on 8 August 2015,
< http://realbusiness.co.uk/article/9671-the-10-biggest-cyber-crimes-of-2011 >.
โข The FBI Federal Bureau of Investigation, Cyber Crime, The FBI Federal Bureau of Investigation,
viewed on 7 August 2015, < https://www.fbi.gov/collections/cyber?b_start:int=0>.
Editor's Notes
Till now attackers were using viruses wormsโฆbut from 2011 they moved one step forward.
Malicious โbeheading and murderโ videos are expected to multiply in the following year. Behaviour analysts and psychologists say teenagers are the most susceptible to clicking on shocking videos, as their empathy for victims of violence is lower.โ