BBB Warns: Top Five Cyber Threats for 2013 - WLOX.com - The News for South Mississippi

BBB Warns: Top Five Cyber Threats for 2013

CHARLOTTE, NC (WBTV) -

The BBB has a warning about the top five cyber threats in 2013.

The year ahead will feature new and increasingly sophisticated means to capture and exploit your personal information to steal your identity.

Computer hackers are already at work to find weaknesses in new and emerging technologies.

"People get very excited with new apps that expand their use of the Internet in ways that were previously not possible," said BBB President Tom Bartholomy. "However, the BBB urges you to proceed with caution when using new tech tools because they do not have a history of reliability and security."
 
The Better Business Bureau has the top five cyber threats expected in 2013:

  1. Malicious Mobile Apps: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it increases your chances of downloading an app that contains a virus.
  2. Counterfeit QR Codes: A Quick Response Code is a barcode that you can scan with your smartphone and it directs you to websites or downloadable content. Similar to skimmers that fit over credit card machines to swipe your credit card, counterfeit QR Codes can be affixed over legitimate barcodes to download malware to your phone or lead you to unsecure websites.
  3. Mobile Wallet Vulnerabilities: Near field communication (NFC) allows two devices to exchange data when they are in the proximity of each other. Smartphone manufacturers, retailers and airlines are beginning to use this information. The vulnerability of near field communication technology is that scammers may use scanners to capture stored credit card information when you are within range of their scanners without you even knowing it happened.
  4. Cloud-Based Botnets: Cloud computing is a growing area of computer technology. The ‘cloud' offers you the ability to select the precise computing power you need. When you use cloud-computing technology, you are linked to other cloud users and this creates a massive virtual networks. Hackers exploit this linked network via phishing schemes which infect users' computers with viruses. The potential exists for hackers to infect this massive network with viruses that would steal credit card and personal information from the computers that are linked through the ‘cloud'.
  5. Search History Poisoning: According to the Emerging Cyber Threats Report 2013 from Georgia Tech, compromised search histories can follow users from computer to computer which could increase the likelihood that you could visit malicious websites without knowing it.

For more information on cyber scams, please visit BBB or Internet Crime Complaint Center.

Copyright 2012 WBTV. All rights reserved.

  • Trending StoriesTrending StoriesMore>>

  • Sheriff: School officer never went inside to confront gunman

    Sheriff: School officer never went inside to confront gunman

    Thursday, February 22 2018 1:14 AM EST2018-02-22 06:14:16 GMT
    Thursday, February 22 2018 11:28 PM EST2018-02-23 04:28:03 GMT
    (AP Photo/Gerald Herbert). Mourners hug as they leave the funeral of Alaina Petty, in Coral Springs, Fla., Monday, Feb. 19, 2018.  Petty was a victim of Wednesday's mass shooting at Marjory Stoneman Douglas High School. Nikolas Cruz, a former student, ...(AP Photo/Gerald Herbert). Mourners hug as they leave the funeral of Alaina Petty, in Coral Springs, Fla., Monday, Feb. 19, 2018. Petty was a victim of Wednesday's mass shooting at Marjory Stoneman Douglas High School. Nikolas Cruz, a former student, ...

    The students who swarmed Florida's state capitol in the wake of Marjory Stoneman Douglas High massacre face pushback in Legislature.

    More >>

    The students who swarmed Florida's state capitol in the wake of Marjory Stoneman Douglas High massacre face pushback in Legislature.

    More >>
  • 'Heartbroken' Kenworthy visits South Korean dog meat farm

    'Heartbroken' Kenworthy visits South Korean dog meat farm

    Friday, February 23 2018 3:05 AM EST2018-02-23 08:05:09 GMT
    Friday, February 23 2018 7:06 AM EST2018-02-23 12:06:20 GMT
    (AP Photo/Ahn Young-joon). In this Friday, Feb. 23, 2018, photo, American freestyle skier Gus Kenworthy, left, and his boyfriend Matthew Wilkas watch dogs in cages at a dog meat farm in Siheung, South Korea. Kenworthy saved five stray dogs during the S...(AP Photo/Ahn Young-joon). In this Friday, Feb. 23, 2018, photo, American freestyle skier Gus Kenworthy, left, and his boyfriend Matthew Wilkas watch dogs in cages at a dog meat farm in Siheung, South Korea. Kenworthy saved five stray dogs during the S...

    The Associated Press joined American freestyle skier Gus Kenworthy on a tour of a Korean dog meat farm that's about to be shuttered by the Humane Society International.

    More >>

    The Associated Press joined American freestyle skier Gus Kenworthy on a tour of a Korean dog meat farm that's about to be shuttered by the Humane Society International.

    More >>
  • Police: father killed 5-year-old son, buried him in backyard

    Police: father killed 5-year-old son, buried him in backyard

    Friday, February 23 2018 5:09 AM EST2018-02-23 10:09:31 GMT
    Friday, February 23 2018 5:09 AM EST2018-02-23 10:09:31 GMT
    Police said a father beat his 5-year-old son to death with a shovel Wednesday, and then buried him in a backyard. (Source: WGCL/CNN)Police said a father beat his 5-year-old son to death with a shovel Wednesday, and then buried him in a backyard. (Source: WGCL/CNN)

    Police said a father beat his 5-year-old son to death with a shovel Wednesday, and then buried him in a backyard.

    More >>

    Police said a father beat his 5-year-old son to death with a shovel Wednesday, and then buried him in a backyard.

    More >>
Powered by Frankly