Skip to content
View in the app

A better way to browse. Learn more.

Thailand News and Discussion Forum | ASEANNOW

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Are cyber-attacks a real threat to us all?

Featured Replies

Apart from the military presence creating havoc in Ukraine, you have also often heard the media talking many times about cyber-attacks as well.

 

Cyber threats are a big deal.

 

Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national security secrets.

 

world-computer-network-technology-technology-communication-world-computer-network-technology-technology.jpg.9d99ea4c651766f1af769c15d2ca5581.jpg

file photo

 

They can result in the theft of valuable, sensitive data like medical records. ... Increased cyber risk is real — but so are the data security solutions.

 

What was the biggest hack in history?

 

On August 15, 2021, the most valuable company in the world Saudi Aramco is crippled by a cyber warfare attack for months by malware called Shamoon. Considered the biggest hack in history in terms of cost and destructiveness.

 

Here the most common types of Cybersecurity attacks:

 

Malware. The term “malware” encompasses various types of attacks including spyware, viruses, and worms. ...

Phishing. ...

Man-in-the-Middle (MitM) Attacks. ...

Denial-of-Service (DOS) Attack. ...

SQL Injections. ...

 

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim's machine.

 

Pretexting is another type of attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.

 

Top Four Hacking Countries.

1.

China

41 percent (of the world's attack traffic)

2.

U.S.

10 percent

3.

Turkey

4.7 percent

4.

Russia

4.3 percent

 

Naturally, it is expected that Russia will not just sit back and do nothing when all the sanctions start taking effect.

 

So really, we should all be on our toes, in case they spread the net and start to try to bring down the banking system, the internet, or even the international air routes.

 

Join our 3 x a week Philippines News, Travel and Expat information newsletter and keep up to date. https://aseannow.com/newsletter.php

 

Create an account or sign in to comment

Recently Browsing 0

  • No registered users viewing this page.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.