While ‘Information security’ always gives us images of breaches, hacks, stolen credit card numbers and bank account numbers, my blog has always been associated with the concepts of ‘Information security’ or the many defenses that are there to keep your information safe.
In this post, I will like to delve into the reality of letting off the ‘Information security’defenses down. Apart from the breaches and hacks, what are the other ugly things that are possible? While this may be common knowledge to those in InfoSec domain – it may not be known to every one. It is always a common thought – “it will not happen to me” – it is a reality that it does happen quite frequently and everybody gets affected at some point or other!
There are a variety of ways in which one can remotely control another person’s Android or Apple device. There are plenty of apps that allow you to control an Android device from a PC, via an another Android device, via WiFi, via Bluetooth and really the possibilities are endless!
I am sure most of you remember the time when Saket Modi, the co-founder and CEO of Lucideus hacked the phone of a person sitting in the audience. Through this hacking, he was able to procure the subject’s SMSes, contacts, call logs, GPS locations and more! (Source: https://www.youtube.com/watch?v=3fT6pUQrY6M)
2. Hacking cars?
Is this even possible? Yes – maybe in the future! Researchers have shown that hackers can remotely kill your engine, lock the doors to your car, put the car in reverse gear without your permission and many other frightening moves!
Automotive hacking may be a distinct possibility as the years roll by!
3. ATM skimming
Many people are sure to have fallen to this type of hack. A small skimmer is attached to the ATM machine by means of which bank details are retrieved. The numbers are then transferred to blank ATM cards and money and data are stolen!
‘Keylogger’ is a type of surveillance software which when installed on your system, can monitor every key stroke, record passwords, captures screenshots and more. It can be run in invisible mode and thereby the user will have no clue of its presence. This is commonly used by employers to keep tabs on their employees.
In addition to all this, the devious mind can find ways to see your private Facebook picture, Instagram pictures and any other private information. In short, the more you want to keep it private online, the more someone is eager to see it! 🙂
This is just the tip of the wild side of security hacks… anything is possible for a determined mind!
How do we protect ourselves from all this?
Maintain a minimal online presence. And it is good to keep up with all security updates and install all patches and upgrades as and when posted.
This is my first post for #MyFriendAlexa. I am taking my Alexa rank to the next level with #Blogchatter
Click on a star to rate it!
Average rating / 5. Vote count:
Let us improve this post!
Thanks for your feedback!
Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.
She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂