Do you have a favorite household gadget? Do you reach for your drill or take out your handy roll of duct tape whenever there’s a problem? Most of us have tools that we are partial to, our tried and true saviors that have gotten us out of a bind time and time again.
When it comes to cybercrime, hackers also tend to stick with certain tools, ones that are proven to be more effective and more forceful than the rest. Sure, sometimes hackers may go out on a limb and experiment with a new technique, but by and large, the threats we face all stem from the same tactics, with some tweaks to the code here and there. In 2015, there were some things that proved essential in so many hackers’ tool kits – Why bother with originality when the old tried and true tools work so well?
It’s these standbys that we have to be the most vigilant about, and there’s a lot we can learn from these tools about how we arm ourselves better for 2016 and beyond.
Most people choose their pizza toppings according to taste…and rightly so!
If you’re like most people who order pizza, how you choose toppings is pretty intuitive. If you like salty flavors, you opt for olives and anchovies; if you prefer sweet flavors, you choose pineapples and corn. If you’ve got a sense of culinary adventure, a combination of hot peppers, spiced pepperoni and buffalo mozzarella may tickle your fancy. In all cases, choosing pizza toppings is a matter of taste, and there’s no need to take it too seriously, really, since it’s just pizza after all.
Selecting the right antivirus is considerably more important, and should be approached in a more informed manner. After all, this isn’t dinner we’re talking about. It’s your personal computer. It’s your private information, your banking details, your personal email, your family photos, and your confidential files. The decision you make regarding how you protect it should be a sensible one based on facts and research, not your sense of taste.
Hackers look for vulnerabilities that they can exploit.
If you look for the term zero-day attack in your home dictionary, you probably won’t find it.
Go ahead and check…I’ll wait.
You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).
Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?
As you sit at your computer, have you ever thought about how someone could gain access to your PC and online accounts by exploiting some weakness or loophole? If that thought has never crossed your mind, now is a good time to start thinking about it. After all, if you’re not taking time to identify and address potential weaknesses and loopholes, cybercriminals are sure to take full advantage of them and make you an easy victim of cybercrime.
Continue Reading… To Prevent Cybercrime, Think Like a Cybercriminal