Conventional wisdom says that once an attacker is in the system, moving laterally from network to network, the damage is already done. The adversary has found a way in and more than likely identified the data they’re after. They simply need to exfiltrate it, the last step of the kill chain, to land the final blow. In some scenarios, however, it’s what the attacker doesn’t do that could have a more devastating outcome on the enterprise. Data manipulation attacks, attacks in which adversaries don’t take data but instead make subtle, stealthy tweaks to data, usually to elicit some type of gain, can be just as, if not more crippling for organizations than theft. The ability of attackers to manipulate and shift data around is a real threat –one that could cause widespread financial and even physical harm as a result if done successfully.
Consider the stock market. Hypothetically speaking, if an attacker were to successfully breach the IT systems and databases responsible for updating a stock ticker symbol and manipulate data to show a billion-dollar tech giant like Apple, Microsoft, Google, or Amazon taking a nose dive, it would cause immediate chaos and panic would ensue. It could result in people selling off their stocks in frenzy–the culmination of a deliberate and effective attack.
Data manipulation attacks don’t always have to result in a tangible financial gain. If an attacker managed to carry out a similar attack against health record information for patients in hospitals and altered critical data like drug dosages and prescriptions that need to be administered, it could result in sickness or even death.
Diese Geschichte stammt aus der March 2020-Ausgabe von PCQuest.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der March 2020-Ausgabe von PCQuest.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
Revolutionizing The Future Of Machine Learning
Quantum algorithms will revolutionize machine learning by end of this decade, significantly enhancing optimization and pattern recognition, with potential breakthroughs in drug discovery and materials science
How to choose the best gaming smartphone in 2024
Discover the essential features and top picks for gaming smartphones in 2024, ensuring every gamer can find the perfect device to enhance their mobile gaming experience
BOSTON LEVIN Storm AIRMAX Earbuds
In the ever-evolving world of wireless audio technology, the Boston Levin Storm AIRMAX earbuds emerge as a promising contender, especially given their current promotional pricing.
WearPods
The WatchOut WearPods is an innovative smartwatch that stands out by integrating True Wireless Stereo (TWS) earbuds into its design. Priced at ₹5,999, this device offers a blend of fitness tracking, music storage, and smart features aimed at the modern, on-the-go individual.
Safeguarding data in the age of AI and digitalization
Cybersecurity is critical for GCCs in fintech, facing evolving threats like AI-powered attacks and ransomware. GCCs are adopting AI-driven defenses, zero-trust architecture, and quantum-resistant cryptography while enhancing employee training to protect against these risks
The power of observability in decrypting cyber threats
Cybersecurity is critical for GCCs in fintech, facing evolving threats like AI-powered attacks and ransomware. GCCs are adopting AI-driven defenses, zero-trust architecture, and quantum-resistant cryptography while enhancing employee training to protect against these risks
The role of audio quality in effective business communication: Why every word matters
High-quality audio is crucial for effective business communication in the digital age. Investing in superior audio tech enhances communication and offers a competitive edge. Focus on audio quality in calls and presentations—it’s key to understanding, connecting, and succeeding
How cloud computing and AI chips are shaping the future of data management
Data is rapidly growing, expected to hit 175 zettabytes by 2025. Cloud computing and AI chips are transforming data management, offering scalable storage, high availability, and enhanced processing. Companies like Netflix and Amazon leverage these technologies to handle data efficiently, ensuring future success
How electric vehicles are redefining environmental responsibility
India’s EV sales soared past one million in 2023, driven by eco-conscious consumers, government initiatives, and urban innovation. With rapid industry growth, expanding charging networks, advancing battery tech, and ensuring affordability are crucial for sustaining this momentum
How to protect your online gaming accounts?
In today’s digital age, online gaming has exploded in popularity, attracting millions to virtual worlds. However, this surge also attracts cybercriminals targeting gaming accounts for financial gain and personal data. Protecting your online gaming accounts is essential to prevent unauthorized access, digital asset theft, and personal information breaches