WatchMojo

Login Now!

OR   Sign in with Google   Sign in with Facebook
advertisememt

Top 5

Top 5
VOICE OVER: Phoebe de Jeu WRITTEN BY: Spencer Sher
It's been on the rise in recent years, so perhaps it's time to educate yourself on how it works and what you can do to avoid it. For this list, we'll be looking at facts related to cyber terrorism, how it affects your life and what you can do to prevent it. WatchMojo counts down the Top 5 Facts About Cyber Terrorism.
Script written by Spencer Sher

Top 5 Facts About Cyber Terrorism


It’s been on the rise in recent years, so perhaps it’s time to educate yourself on how it works and what you can do to avoid it. Welcome to WatchMojo’s Top 5 Facts and in this installment, we’re counting down the Top 5 Facts About Cyber Terrorism.

For this list, we’ll be looking at facts related to cyber terrorism, how it affects your life and what you can do to prevent it.

#5: ANYTHING Connected to the Internet Can Be HACKED

Quick! Smash your phone and computer and run for the hills! No one is safe! In all seriousness, there are some things you should know about protecting yourself from cyber terrorists. First, information security is far from an exact science. Technology is still developed by humans and humans make mistakes. Even the most expensive software is at risk; and often the best defense is to simply keep it updated at all times. Second, certain programs are present on 99% of computers – programs such as Adobe Flash and Oracle Java, which are vulnerable to exploitation. To avoid being a victim of cyber terrorism, keep your software updated and don’t click on anything that even remotely resembles spam.

#4: Businesses Are Robbed Constantly

We tend to assume that cyber terrorists are solely motivated by their political, social or religious beliefs. The truth is that many of today’s hackers are simply trying to make some quick cash; and they’re pretty damn good at it. When it comes to cyber theft, businesses of all sizes are at risk; from that Chinese restaurant you love all the way up to tech giants such as Google and Yahoo. In fact, according to PwC’s 2014 Global Economic Crime Survey, “7% of U.S. organizations lost $1 million or more due to cybercrime in 2013.” Figures like that are what’s causing the world to spend upwards of $90 billion a year on information security.

#3: Hackers Love Social Media

It would appear that the pull of social media is too much for even the cyber terrorists to resist. The only problem is that unlike most people, they are using it for a much more nefarious reason. Hackers know that billions of people spend countless hours per day perusing social media sites. As such, they use tactics such as “link-jacking”, which redirects users to unsafe websites loaded with infections and “phishing”, an information-gathering scheme that elicits sensitive information from users by posing as a seemingly trustworthy source. Social media has proven to be such an easy target that Facebook conceded in 2011 that it experiences over 600,000 cyber attacks each day! Yikes!


#2: In Some Cases, Governments Are to Blame

In their never-ending quest to stay one step ahead of impending cyber attacks, many governments have chosen to create their own malware, employing it as a digital counter measure. What’s malware, you ask? It is basically a blanket term for all the bad stuff your computer experiences such as viruses, ransomware and spyware. The problem is that cyber criminals are smart, and will often reverse engineer government malware, playing the role of Victor Frankenstein and turning it into something even worse. They then release this more advanced malware into the world, turning governments into unwitting cyber terrorism participants.

#1: A Strong Password Goes a Long Way

With stories of large-scale cyber attacks permeating the daily news cycle, it can sometimes feel like no one is safe. However, protecting yourself is much easier than you think. There are two things you can do that will dramatically reduce your chances of being hacked: create unique passwords for all your devices and services and use a two-step verification process. The latter is offered as a protection option for the majority of email accounts and social networks and works by sending an authentication message to your mobile device. These two simple steps will often protect you from harm going forward.

Comments
advertisememt