What Cyber Criminals Are Planning To Do in 2014?


Recently, when Facebook brought WhatsApp, there were posts on Facebook that reads, “Rest in Peace Privacy–Facebook on your mobile.” This will lead to greater popularity for services like VPN, Tor-anonymous network and local encryption tools. In addition, LinkedIn along with other professional networks may become a hotspot for hackers who create fake accounts with the intention of getting closer to top honchos of the corporate world. It is so easy to create a profile and fill it out with keyword-laden, fake information to start connecting with other users.

Money Thiefs: In 2014, you need to be aware that cyber criminals are all set to burn a hole in your pocket directly as they further refine their tools. Mobile botnets which are a network of private computers inflicted with malicious software and controlled as a group without the owners' knowledge, are expected to be brought by vested interests. Indirect stealing of information will become more sophisticated. Trojan versions that encrypt the data on mobile devices are expected to be used to achieve the heinous objective. The Trojan will thus prevent you from accessing your own photos, contacts and correspondence until you hand over a fee for getting the decryption code.

Read More:

Longest Free Wi-Fi Hub Of The World In Patna, India

Maintaining Windows XP After April 8 May Cost 1,190 Crore/Year