Hacking a site or a database takes a decent amount of skill and a lot of man hours, as you can imagine. But, there’s a new breed of hacker that isn’t as skilled… we’ll call them “aspiring hackers”. Instead of spending their days cracking code, they’re simply using premade hacking tools developed by more advanced hackers.
Identity Theft is a hot topic as we enter 2013. Hackers are developing more ways to steal identities, and it’s only getting easier for them. According to Time Magazine, 2.5 million dead people get their identities stolen every year. We are all at risk, and yet most do very little to protect themselves and their data.
Not only are phishing attacks increasing exponentially, but they are also becoming more and more advanced and more targeted. The latest discovered by researchers is known as “Bouncer List Phishing”. Unlike most bouncer lists, this is one list you really don’t want to be on!
In the last year, there have been several instances where new, unused devices were found to already have malware installed on them. Imagine saving up for your HTC Magic Smartphone and finally walking in to Vodafone to purchase it. All that’s on your mind is what new ringtone you’re going to put on it. But when you get it home, and turn it on, you find it’s infected with malware! You’re already at risk of identity theft and you’ve barely even turned it on. Congratulations, you just purchased a device with malware pre-installed.
A new piece of malware was recently reported to breach the internet security of regular web users: the image-stealing Trojan. Yes, as it turns out, malware can now steal photos as well.