New technologies make it easier for all of us to get our work done online, communicate with others, and take advantage of all the Internet-based entertainment that’s available today. But many of those same technologies have also made it easier for cyber criminals—the bad guys who use the ‘Net for illegal purposes—to do their dirty deeds. We’re talking about hackers, attackers, spammers, scammers, phishers, and other criminal types. In this article, we’ll take a look at the top 10 online technologies that they love to exploit and see how you can protect yourself, both at home and at your business, when using those technologies.
|
AuthorHi, I am Indrajit Banerjee. I am CCNA, MCSE and CCNP certified and currently pursuing MBA. I am working as a Systems and Network Administrator at an MNC and have more than 5 years of Experience in Systems and Network Administration, Security and Design. My Hobbies are working on System and Network Security, Working on different types of Application Servers, System and Network Penetration and vulnerability testing (few people define it as Hacking) and blogging. |