Zombie drones, infected light bulbs and listening smartphones;cyber attacks are evolving to rely on physical devices and spying techniques,as Roland Moore-Colyer discovers.
Install some security software on your PC, whack on the firewall, make sure your router has decent password encryption, don’t use the same login credentials for every website, and whatever you do don’t click on dodgy links in emails from unusual PayPal addresses. For protecting everyday computing, these are all pretty decent practices.
Sure, hackers are forever digging up vulnerabilities in software and web services, but even if they swipe data, as long as you’re careful with what information you put online, you stand a good chance of stopping cyber criminals from nicking your identity or going on a shopping spree with your credit card details.
Meanwhile, the big distributed denial of service (DDoS) attacks are normally targeted at major websites or companies rather than the laptop of the average web surfer.
So are the security-savvy among us mostly safe from cyber crooks and have-a-go hackers? Well, unless you’re super-paranoid and spend your life on a remote farm or in an electromagnetic protected Perspex box, then the answer is no.
The reason for this is the creation of new cyber-attack vectors that exploit mass networks of computers and openly available data, and work at weaknesses in real-world systems rather than just lurk on the virtual highways of the internet.
Physical hacking
Looking back at the turbulent year of 2016, aside from Brexit shocks and Trump victories, we also heard news stories about cars and planes being hacked. These intrepid cyber explorers were keen to think beyond the traditional use of web browsers and email as routes to spread malware and gain control over various systems that many would not think of as vulnerable to cyber attacks.
Diese Geschichte stammt aus der April 2017-Ausgabe von Computer Shopper.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der April 2017-Ausgabe von Computer Shopper.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
XIAOMI Mi Mix 3 5G
VERDICT This is the most affordable of the first 5G smartphones, but even with great hardware, the service isn’t yet worth the expense
RHA T20 Wireless
VERDICT They’re not cheap, but these well-designed earphones deliver superb sound quality
Protect And Preserve
Data might be A Valuable Commodity, But It’s Remarkably Easy To Lose Or For Others To Get Their Hands On. Mike Bedford Provides Guidance On How To Preserve, Recover And Destroy Data, And Looks At The Technologies Involved
NZXT H510i
VERDICT Some qualities shine through, but this is an underwhelming case from a maker we know can do better
Kicking Off A New Era Of Football?
With the new football season well and truly under way, David Crookes talks to Jon Hare about reviving the spirit of Sensible Soccer with a new, more sociable offering that he hopes will avoid an own goal
NAIM Mu-so 2
VERDICT A luxurious and fine-sounding slab of metal, but for most homes it won’t be worth the expense
Motorola One Vision
VERDICT The One Vision comes close to being a brilliant mishmash of tech – shame about the camera
JBL Xtreme 2
VERDICT With top-quality sound and a versatile design, this is a great – if expensive – rugged Bluetooth speaker
HUAWEI MateBook 13
VERDICT What the MateBook 13 lacks in flourish, it makes up for in value and performance
GIGABYTE X570 Aorus Master
VERDICT A loaded and forward-thinking motherboard, but not one that fully justifies its high price