Globally, cybercrime is increasing. According to Cybersecurity Ventures, cybercrime damages will cost the world $6 trillion annually by 2021. For individuals, cybercrime is also a concern: in 2016, one in 131 emails contained malware, the highest rate in 5 years.
But have you ever wondered how hackers access data? While common scams include social engineering attacks like phishing emails, more sophisticated hackers are able to collect sensitive data using techniques that target even the most secure machines, like air-gapped systems that aren’t connected to the internet.
Think the smartphone placed near your keyboard is harmless? What about the monotonous blinking of a hard drive’s LED light? Both of these seemingly inconsequential occurrences could actually be threat actors siphoning data, like passwords and keystrokes. What’s more is that these techniques are designed to be used on systems that contain some of the world’s most sensitive information, like that of the government or military. If their information can be hacked, so can yours.
Each year security researchers discover new ways to siphon encrypted data and sensitive materials from secure systems, often basing their research on methods used by covert or state-sanctioned hackers. The team at Top10VPN used this research and real cyberattacks to compile a list of the 10 wildest ways hackers can steal data, below.
This graphic was made by these guys .
If you would like to have your company featured in the Irish Tech News Business Showcase, get in contact with us at [email protected] or on Twitter: @SimonCocking