SlideShare a Scribd company logo
1 of 16
Five Cyber threats to be
careful in 2018
It is not true that people are safe from hackers
because they only target big companies for money and
other purposes. Every person using debit or credit
cards, doing online transactions, using the internet can
get affected by cyber threats. You may lose money
before even recognizing the situation. Simple mistakes
from users open the entry for virus and malware coded
by hackers.
Gain knowledge of cyber threats and preventive
measures by reading this article to escape vicious
attacks.
A threat can be represented with lots of activities. But
a cyber threat means, “attacking PC’s and Laptops to
steal confidential information or to fail the system
completely” and is performed by hackers. Cyber
threats won’t stop with the above two mentioned
activities; those were just samples of exploitation.
Cyber threats include personal information
exploitation, stealing confidential data from companies,
stealing money from online payment systems, damaging
the reputation of companies by adding malicious
data/virus on their websites and many more. The data
breach, virus, malware, phishing, auth attacks and
application attack are some of the common routes used
by hackers.
1.Using Artificial Intelligence
Machine learning and Artificial intelligence are
trending topics in this century. What exactly are
those? Task automation is possible with the help of AI.
Repetitive tasks which follow same behavior for
execution can use AI to reduce human’s time spent on
it.
AI can replicate behaviors with Machine learning
models. We give the data, and AI will learn accordingly
with its responses. You may have tried AI chat apps
and if not, give them a try. They are virtual chat bots
coded with default responses. Based on our chat, it
improves, and this resembles a basic workflow of
Machine learning.
Let’s see how hackers use the above technologies to
make phishing attacks on people.
● Messages will be sent to emails/mobiles as
“you have won a huge amount of money, kindly share
personal and bank details for crediting money.”
● Few ignore it which is the safest route to block
hacker attacks.
● Some people want to know more information, and
they reply to those messages.
● This is where machine learning and AI comes to
play.
● Convincing messages are sent to us with the help
of AI so that we believe it and provide our
personal information.
● Be aware of these kinds of phishing attacks.
2. In Cryptocurrencies
Bitcoin comes in mind with the term cryptocurrency.
There are no governments or any institution that
makes them. Mining creates Bitcoin. Mining requires
computing power to generate Bitcoins.
Hackers are trying to get into our systems and use
computing power without the owner’s permission. The
bitcoins thus formed with mining can be used for
selling or other purposes.
Sometimes people may observe a decrease in the
performance of the computer/laptop. Reasons may
vary, but there are chances that hackers use your
computer to mine Bitcoins.
Hackers also found numerous ways to bypass antivirus
security measures to get into the system. Thus, it is
essential to keep your antivirus updated with latest
versions.
Related: AI and machine learning takes marketing to
next levels
3. Influencing Elections
Cyber threats are on every platform. The latest issue
of Facebook and Cambridge Analytica shocked the
world. In case you do not know about this, read on to
find if your data on Facebook is really secure or not.
Cambridge Analytica is a consulting firm. According to
reports, they influenced 2016 presidential elections by
collecting over 50 million user database from FB.
Programmers developed personality quiz apps with
which their likes/dislikes, interests, and many other
factors were known. They targeted people with positive
favor over trump on social media.
They also influenced people who are not in favor and
turned them to vote for Trump. Data scandal shocked
the world and FB admitted their mistake. Modifications
to privacy settings are done to protect users.
These types of cyber threats can single-handedly
change the outcome of elections. Governments along
with Social media combined to hold the responsibility
to protect the privacy of users and should take
effective steps and measures for prevention.
4. Ransomware
Ransomware attacks are straightforward. Hackers
hack into systems and lock the content with encryption.
The only way to unlock them is to use passwords
provided by hackers. They demand money for unlocking.
Encrypted data is tough to unlock.
Companies have no other options but to give away
money. These attacks are done for acquiring vast
amounts of money. Hackers won’t target small
companies as they can’t afford demands. Big companies
like Google, Yahoo, Facebook have skilled programmers
to defend against ransomware attacks.
So, hackers target companies that are doing well in the
market and in developing stage. All data is stored on
the cloud. Hackers enter the cloud and lock out the
data in servers. Data includes login credentials, client’s
data, company’s data, etc. “The WannaCry” Ransomware
attack is a warning that more cyber attacks happen in
future.
In U.K, most of the computers in hospitals are locked,
and a notice is displayed on the screen. No buttons
work, and if people try to be smart, the system will
shut down itself. The note includes the amount to pay
for unlocking the computers back. They reportedly
used three Bitcoin wallets for receiving money. In this
case, patients and hospitals data are necessary.
Hackers leave no other options than to pay the ransom.
5. Data Breach
Data breach by hackers is not new. They have been
doing this by stealing data to use credit cards,
shopping on victim’s money and many more. Hackers also
used data to create fake passports and used for their
needs.
Phishing is a common way to know about bank details.
Let’s imagine a situation where you searched for movie
download and clicked on flashing links. Few links open
and without the user notice virus downloads and enters
the system.
The virus will be in connection with Hackers via the
Internet. It can slow down your computer, lock the
system, steal data and send to hackers, etc. The virus
will record your activities over the internet. Fake
emails will be sent by hackers to change your
information from the websites you use. But the data
entered by users will go directly to hacker’s hands.
While shopping online, it is vital to observe the web
pages. If you find something odd, do not do
transactions. It’s because when you click on the payout,
a fake page resembling the payment page becomes
visible. The card information will be recorded and sent
to hackers by the virus. They will use the card details
to shop for items, use money and users will never be
able to know.
Final Words
Be aware of these threats. We must follow the quote
“Prevention is better than cure.” Ignore and avoid the
fake messages that come in emails and smartphones. It
is your hard-earned money and is your right to secure
it from getting into the hands of hackers.
Get Technology, Crypto, Business, Digital
Marketing updates along with Travel
surprises to plan your business strategies
as well as to plan your next travel
adventure with Cubic24.

More Related Content

What's hot

Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISRAHUL KUMAR
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackrohit2495
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking Systempaperpublications3
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftAppsian
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are hereAbhay pal
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror StoriesStu Sjouwerman
 

What's hot (19)

Data Breach
Data BreachData Breach
Data Breach
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Phishing
PhishingPhishing
Phishing
 
Bi
BiBi
Bi
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are here
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 

Similar to Five cyber threats to be careful in 2018

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxmattinsonjanel
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 

Similar to Five cyber threats to be careful in 2018 (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Data breach
Data breachData breach
Data breach
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Unit 1
Unit 1Unit 1
Unit 1
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 

More from Ronak Jain

Tips for small pet parent
Tips for small pet parentTips for small pet parent
Tips for small pet parentRonak Jain
 
Perfect diet for small pets
Perfect diet for small pets Perfect diet for small pets
Perfect diet for small pets Ronak Jain
 
You tube's initiative to counter hate and extremism
You tube's initiative to counter hate and extremismYou tube's initiative to counter hate and extremism
You tube's initiative to counter hate and extremismRonak Jain
 
Most haunted 10 places in india
Most haunted 10 places in indiaMost haunted 10 places in india
Most haunted 10 places in indiaRonak Jain
 
Importance of regional language in digital marketing
Importance of regional language in digital marketingImportance of regional language in digital marketing
Importance of regional language in digital marketingRonak Jain
 
How to click gorgeous fashion photos
How to click gorgeous fashion photosHow to click gorgeous fashion photos
How to click gorgeous fashion photosRonak Jain
 
Better safe than sorry
Better safe than sorry Better safe than sorry
Better safe than sorry Ronak Jain
 
Which model type suits your personality best
Which model type suits your personality bestWhich model type suits your personality best
Which model type suits your personality bestRonak Jain
 
Make your pet coolest among all
Make your pet coolest among allMake your pet coolest among all
Make your pet coolest among allRonak Jain
 
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?Ronak Jain
 
10 unusual models in the fashion industry
10 unusual models in the fashion industry10 unusual models in the fashion industry
10 unusual models in the fashion industryRonak Jain
 
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?HOW TO NAIL LOW LIGHT PHOTOGRAPHY?
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?Ronak Jain
 
TOP 10 FASHION PHOTOGRAPHERS OF INDIA
TOP 10 FASHION PHOTOGRAPHERS OF INDIATOP 10 FASHION PHOTOGRAPHERS OF INDIA
TOP 10 FASHION PHOTOGRAPHERS OF INDIARonak Jain
 
THE HISTORY OF CAMERA AND ITS FIRST USAGE
THE HISTORY OF CAMERA AND ITS FIRST USAGETHE HISTORY OF CAMERA AND ITS FIRST USAGE
THE HISTORY OF CAMERA AND ITS FIRST USAGERonak Jain
 
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIA
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIAWORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIA
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIARonak Jain
 
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPET
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPETMOST EXPENSIVE JEWELLERY WORN ON THE RED CARPET
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPETRonak Jain
 

More from Ronak Jain (20)

Tips for small pet parent
Tips for small pet parentTips for small pet parent
Tips for small pet parent
 
Perfect diet for small pets
Perfect diet for small pets Perfect diet for small pets
Perfect diet for small pets
 
You tube's initiative to counter hate and extremism
You tube's initiative to counter hate and extremismYou tube's initiative to counter hate and extremism
You tube's initiative to counter hate and extremism
 
Most haunted 10 places in india
Most haunted 10 places in indiaMost haunted 10 places in india
Most haunted 10 places in india
 
Dog is pyaar
Dog is pyaarDog is pyaar
Dog is pyaar
 
Importance of regional language in digital marketing
Importance of regional language in digital marketingImportance of regional language in digital marketing
Importance of regional language in digital marketing
 
How to click gorgeous fashion photos
How to click gorgeous fashion photosHow to click gorgeous fashion photos
How to click gorgeous fashion photos
 
Strike a pose
Strike a poseStrike a pose
Strike a pose
 
Better safe than sorry
Better safe than sorry Better safe than sorry
Better safe than sorry
 
Which model type suits your personality best
Which model type suits your personality bestWhich model type suits your personality best
Which model type suits your personality best
 
Make your pet coolest among all
Make your pet coolest among allMake your pet coolest among all
Make your pet coolest among all
 
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?
WHY YOUR PICTURES DON’T TURN OUT THE WAY YOU THOUGHT THEY WILL?
 
10 unusual models in the fashion industry
10 unusual models in the fashion industry10 unusual models in the fashion industry
10 unusual models in the fashion industry
 
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?HOW TO NAIL LOW LIGHT PHOTOGRAPHY?
HOW TO NAIL LOW LIGHT PHOTOGRAPHY?
 
TOP 10 FASHION PHOTOGRAPHERS OF INDIA
TOP 10 FASHION PHOTOGRAPHERS OF INDIATOP 10 FASHION PHOTOGRAPHERS OF INDIA
TOP 10 FASHION PHOTOGRAPHERS OF INDIA
 
Dogs or god
Dogs or godDogs or god
Dogs or god
 
Stylists
StylistsStylists
Stylists
 
THE HISTORY OF CAMERA AND ITS FIRST USAGE
THE HISTORY OF CAMERA AND ITS FIRST USAGETHE HISTORY OF CAMERA AND ITS FIRST USAGE
THE HISTORY OF CAMERA AND ITS FIRST USAGE
 
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIA
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIAWORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIA
WORLD’S RAREST AND MOST EXPENSIVE DIAMOND IS FROM INDIA
 
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPET
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPETMOST EXPENSIVE JEWELLERY WORN ON THE RED CARPET
MOST EXPENSIVE JEWELLERY WORN ON THE RED CARPET
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Five cyber threats to be careful in 2018

  • 1. Five Cyber threats to be careful in 2018
  • 2. It is not true that people are safe from hackers because they only target big companies for money and other purposes. Every person using debit or credit cards, doing online transactions, using the internet can get affected by cyber threats. You may lose money before even recognizing the situation. Simple mistakes from users open the entry for virus and malware coded by hackers. Gain knowledge of cyber threats and preventive measures by reading this article to escape vicious attacks.
  • 3. A threat can be represented with lots of activities. But a cyber threat means, “attacking PC’s and Laptops to steal confidential information or to fail the system completely” and is performed by hackers. Cyber threats won’t stop with the above two mentioned activities; those were just samples of exploitation. Cyber threats include personal information exploitation, stealing confidential data from companies, stealing money from online payment systems, damaging the reputation of companies by adding malicious data/virus on their websites and many more. The data breach, virus, malware, phishing, auth attacks and application attack are some of the common routes used by hackers.
  • 4. 1.Using Artificial Intelligence Machine learning and Artificial intelligence are trending topics in this century. What exactly are those? Task automation is possible with the help of AI. Repetitive tasks which follow same behavior for execution can use AI to reduce human’s time spent on it. AI can replicate behaviors with Machine learning models. We give the data, and AI will learn accordingly with its responses. You may have tried AI chat apps and if not, give them a try. They are virtual chat bots coded with default responses. Based on our chat, it
  • 5. improves, and this resembles a basic workflow of Machine learning. Let’s see how hackers use the above technologies to make phishing attacks on people. ● Messages will be sent to emails/mobiles as “you have won a huge amount of money, kindly share personal and bank details for crediting money.”
  • 6. ● Few ignore it which is the safest route to block hacker attacks. ● Some people want to know more information, and they reply to those messages. ● This is where machine learning and AI comes to play.
  • 7. ● Convincing messages are sent to us with the help of AI so that we believe it and provide our personal information. ● Be aware of these kinds of phishing attacks. 2. In Cryptocurrencies Bitcoin comes in mind with the term cryptocurrency. There are no governments or any institution that makes them. Mining creates Bitcoin. Mining requires computing power to generate Bitcoins.
  • 8. Hackers are trying to get into our systems and use computing power without the owner’s permission. The bitcoins thus formed with mining can be used for selling or other purposes. Sometimes people may observe a decrease in the performance of the computer/laptop. Reasons may vary, but there are chances that hackers use your computer to mine Bitcoins. Hackers also found numerous ways to bypass antivirus security measures to get into the system. Thus, it is essential to keep your antivirus updated with latest versions.
  • 9. Related: AI and machine learning takes marketing to next levels 3. Influencing Elections Cyber threats are on every platform. The latest issue of Facebook and Cambridge Analytica shocked the
  • 10. world. In case you do not know about this, read on to find if your data on Facebook is really secure or not. Cambridge Analytica is a consulting firm. According to reports, they influenced 2016 presidential elections by collecting over 50 million user database from FB. Programmers developed personality quiz apps with which their likes/dislikes, interests, and many other factors were known. They targeted people with positive favor over trump on social media. They also influenced people who are not in favor and turned them to vote for Trump. Data scandal shocked the world and FB admitted their mistake. Modifications to privacy settings are done to protect users.
  • 11. These types of cyber threats can single-handedly change the outcome of elections. Governments along with Social media combined to hold the responsibility to protect the privacy of users and should take effective steps and measures for prevention. 4. Ransomware Ransomware attacks are straightforward. Hackers hack into systems and lock the content with encryption. The only way to unlock them is to use passwords provided by hackers. They demand money for unlocking. Encrypted data is tough to unlock.
  • 12. Companies have no other options but to give away money. These attacks are done for acquiring vast amounts of money. Hackers won’t target small companies as they can’t afford demands. Big companies like Google, Yahoo, Facebook have skilled programmers to defend against ransomware attacks. So, hackers target companies that are doing well in the market and in developing stage. All data is stored on the cloud. Hackers enter the cloud and lock out the data in servers. Data includes login credentials, client’s data, company’s data, etc. “The WannaCry” Ransomware attack is a warning that more cyber attacks happen in future.
  • 13. In U.K, most of the computers in hospitals are locked, and a notice is displayed on the screen. No buttons work, and if people try to be smart, the system will shut down itself. The note includes the amount to pay for unlocking the computers back. They reportedly used three Bitcoin wallets for receiving money. In this case, patients and hospitals data are necessary. Hackers leave no other options than to pay the ransom. 5. Data Breach
  • 14. Data breach by hackers is not new. They have been doing this by stealing data to use credit cards, shopping on victim’s money and many more. Hackers also used data to create fake passports and used for their needs. Phishing is a common way to know about bank details. Let’s imagine a situation where you searched for movie download and clicked on flashing links. Few links open and without the user notice virus downloads and enters the system. The virus will be in connection with Hackers via the Internet. It can slow down your computer, lock the system, steal data and send to hackers, etc. The virus
  • 15. will record your activities over the internet. Fake emails will be sent by hackers to change your information from the websites you use. But the data entered by users will go directly to hacker’s hands. While shopping online, it is vital to observe the web pages. If you find something odd, do not do transactions. It’s because when you click on the payout, a fake page resembling the payment page becomes visible. The card information will be recorded and sent to hackers by the virus. They will use the card details to shop for items, use money and users will never be able to know. Final Words
  • 16. Be aware of these threats. We must follow the quote “Prevention is better than cure.” Ignore and avoid the fake messages that come in emails and smartphones. It is your hard-earned money and is your right to secure it from getting into the hands of hackers. Get Technology, Crypto, Business, Digital Marketing updates along with Travel surprises to plan your business strategies as well as to plan your next travel adventure with Cubic24.