What to expect of hacking in 2012 – Part 2

Tuesday, January 3rd, 2012 5:47:38 by

Last year, the Texas water supply system got hacked to prove it can be alongside several banks in Europe, by a single hacker. The very Die Hard 4 moment can therefore be expected in the near future and that is not going to be pretty because there might not
be a John McClane to save our backs.

On the flip side, personal computing has gone in the back drop of what is to come next. Android market is waterlogged with malicious software lately and more is expected to come. Apple has been careful in this regard as they keep a strict check on the application
that are published on the AppStore or iTunes. However, the open Android Applications stores have undoubtedly captured almost 50 percent of the market but with a compromise on one aspect, security.

Although Google is quick in responding to the calls on malicious software and has removed dozens of malware-containing software in March, May and December but the third party market is still prone to scammers.

There is very small probability of any user containing malicious application but as the approach toward the cause is reactive, therefore, there are already some users that have malware in their smartphones. This mostly comes from third party developers.

Social networks like Facebook and Twitter have made the current society a data sharing community. We the users of Facebook, Google Plus and Twitter share a lot of information about us with our friends on these networks and friends of their friends. However,
despite knowing the remifications of such publicity of our private data, we seem to ignore it.

Companies like Facebook are furthering their efforts in integrating the data of users with third party companies, securely, of course but there still remains a question for such activites, Why? However, this a two way argument. The companies need to supply
with adequate explanation to justify the sharing of data with third party developers like Zynga and the users need to ask themselves, why should they be stuffing so much information that needs not to be told in the first place.

However, all been said, this year is going to be a gargantuan task for e-companies to make their networks and software to be secure as much is at stack.

Tags: , , , , , , , , , , , , , , , ,

Short URL: https://www.newspakistan.pk/?p=8097

Posted by on Jan 3 2012. Filed under Sci-Tech. You can follow any responses to this entry through the RSS 2.0. You can leave a response or trackback to this entry

You must be logged in to post a comment Login

Join WishFree.com

Photo Gallery

Unique Auction UAE
Log in