Cybersecurity insecurity

I had a chance to attend an IEEE cybersecurity presentation recently and left wanting to ditch all my computers and smartphones to move into the deep woods as far off the grid as possible. The presentation included very high-level demonstrations of several common methods that attackers use to gain access to your PC or smartphone. Readily available hardware and software were used to illustrate how easy it is for someone to gain unauthorized access. Within a matter of seconds, a cyber attacker can monitor your every keystroke during a public hotspot session. To top that, allow them physical access to one of your devices and they can inject a worm in two to three seconds, which gives them complete remote access to your device and anything that it connects to in your personal or business environment.

Sorry, the full text of this article is not currently available. Please try back later.

The editor was notified of this error on: Thursday 22nd of August 2019 07:30:26 AM.