Almost every day, we hear about a new security breach, but who’s behind these attacks? Whether you’re dealing with the “professional mercenary,” the “cyber warrior” or the “malicious insider,” cyberhackers come in many shapes and sizes. See the infographic below depicting the many faces of today’s hackers, from general types of hackers that enterprises often face to the types of attacks they’re most likely to deploy. Click on the image to magnify and download.
Click here to read the full story and download the infographic from darkreading.com.
With the rise of hacker incidents, cyber security and privacy has become a hotbed issue. The prevalent Internet privacy framework of today is the “notice-and-consent framework,” or what you do every time you click on an “accept” button. You have been notified and given consent.
This framework, however, allows data aggregators and brokers to take your data and pretty much do whatever they please and many consider this insufficient to protect individual’s privacy.
The idea of “responsible use” on the other hand, puts the responsibility on the “entities that collect, maintain and use data.” This means that data collectors and users are accountable for how they manage data and any harm it causes.
Imagine the positive publicity organizations that endorse responsible use would generate.
And you’ll probably think twice before you hit that “accept” button.