Tuesday, December 19, 2006

Top 10 Security Risks or Cyber Crimes in 2007


1. Your computer will probably crash a lot or at least reboot for no apparent reason but most likely due to some patch you got through an automated update which you are told to do for security reasons because apparently security and stability are incompatible.

2. You will misplace, lose, over-write, and delete documents probably accidentally but you really can't remember if you really had that document saved or not and maybe it's this one here but you don't know because when you try to open it you get a CRC error and you'll realize that nobody warned you that the ever-decreasing life of these huge hard-drives you can now buy have fallen to just under 2 years.

3. While using emule and bit torrent you think you're being watched by the MPAA and RIAA and you seriously cut down on your downloading which makes you re-discover things you downloaded that you never watched or played before but some of the media files won't play right and you won't know if it's the codec, the program, or the file so you download more and more until your ISP jacks you with a huge bill for excessive bandwidth usage.

4. You'll get spyware and adware and everything else just from browsing distant Korean servers for torrents, swapping files with "friends" you just met on IM, and accepting SMSes from unknown people. You may also get chlamydia or worse if you troll seedy places and accept sexual invitations with as many unknown people as you do electronically so no surprises there.

5. If your phone is also a computer or your TV is also a computer or your oven is also a computer and they're running some open networking protocol like Bluetooth all the time which you never read the manual on how to shut it off, expect that bad people are happy to do bad things to them just like if you leave kids running around in public places unattended then bad people may do bad things to them as well with the odds basically being the same for all of it all happening.

6. You will get emails from your bank or paypal where you have to log in there to verify a transaction which then by all means you will use the link in the mail because we all know we don't always bookmark the websites we use so often in our browser and also because you're just being click-lazy and so then bad people steal your identity and your credit card numbers and try to buy stuff and ship it to Indonesia but your bank calls to alert you that they canceled your card and will send another to you in 3 to 4 weeks but you trip on the way to the phone and get a nasty bruise on your knee.

7. Your bank will add more small print and find new ways to charge for internet-enabled things they save money on but they call it a new service so you pay more for it.

8. The cool new software you buy will ask you for the CD-Key and no matter how many times and with caps or not that you type it that damn 24-character code and wait for it to call home the message repeats that it already exists because some punk copied out of the box in the store for his pirated version and so you have all the pain and expense of going back to the store where you end up also buying some USB stuff you didn't need which ends up not really working right anyway.

9. The sweet girl from procurements with the pink-laced keds gets caught selling toner cartridges on E-bay which she stole from your office printer and she tells the boss that she didn't know it was from there because you gave it to her and when they go to investigate they find some work documents on your personal USB key drive that you needed to move files to another computer in a department with a printer that still had toner along with a file full of MP3s and spreadsheet full of numbers you'd been toying with to see if it's feasible to start your own competing business.

10. You're new video and tv-capable mobile phone will have a feature to download certain programs and ringtones wirelessly but you don't get a chance to try it because someone steals it off the conveyor belt at the airport security checkpoint.

(Source: Institute for Security and Open Methodologies)

No comments: