McAfee states phones will be main target of hackers

Smartphones and smart phones fit our modern pace like a glove. Having access to the Internet at all times and all places seems almost essential in this ever more technical world. Many have eschewed PCs and laptops altogether and use cellular devices as their only means of accessing the Internet. But some say that we should be careful with the less-secure devices. Article source: Mobile devices huge target for hackers in 2012

PCs are safer

In 2012, Internet scam artists and hackers are going to be focused on smart phones, as reported by computer security business McAfee. The company is warning people to stop relying on cell phones so much.

Scott Budman, from KNTV, spoke with Gary Davis in an interview. Davis, from McAfee, said:

"Mobile devices are far behind where PCs are from a security perspective."

New target for hackers

Stealing identities might be one of the most common things hackers will do, as reported by Davis. He said that hackers can watch all online activity with simple viruses.

Davis continued:

"They can put it into your device, and while you are doing a banking transaction, it could step in, capture the transaction, then take control of your bank and drain all of your money."

What does Davis predict?

As reported by Davis, there will start to be coordination between occupation-style protestors and computer hackers. He calls this “the rise of the hacktivist.” He believes that hackers will work while people continue to protest:

"Hacktivists may take a major bank, do a denial of service attack for like an hour, while the occupiers are surrounding the bank and picketing. So we will see more coordinated efforts between both the physical and the virtual, though hacktivism."

Hackers can make an internet resource unavailable with a denial of service attack.

Security should be more significant

To shield yourself, Davis suggests treating your mobile system like your home computer when it comes to security. Update security and anti-virus software regularly. And always treat unfamiliar emails, links and other communications carefully.





No votes yet