Q3: Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?
A: My personal and financial information, projects, plans, photos, videos have been stored in my computer. I think that while my computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits my personal and financial information, private photos àn videos without my knowledge or consent. Or, a computer predator may pounce on the private information I unwittingly revealed. In either case, they will be able to: Hack my usernames and passwords; Steal my money and open credit card and bank accounts in my name; Ruin my credit; Request new account Personal Identification Numbers (PINs) or additional credit cards; Make purchases; Add themselves or an alias that they control as an authorized user so it’s easier to use my credit; Sell my information to other parties who will use it for illicit or illegal purposes.
Predators who stalk people while online can pose a serious physical threat. Using extreme caution when agreeing to meet an online “friend” or acquaintance in person is always the best way to keep safe.
You must log in to post a comment.