Join our network of non-profits, companies and individuals who believe social change can happen through design.

Become A Member

Cotton Candy

Kobenhavn, Kobenhavn, Denmark

Designer (Writing)

Member since February 07, 2013

  • Abney Associates Infotech Update: Cyber-Threat Trends of 2013 - clipboard

    Community, Communication Design


    abney associates infotech update

    Experts forecast a rise in computer and cellphone scams It takes no expert to predict that there will be for sure an increase of sophisticated methods and updates of old scams to try to take control of our computers and cellphones to get identities and money. Yet another year, here comes 2013, scammers are busy or maybe had already developed new ways to swindle us in the coming months. Sign up for the AARP Money Newsletter. This comes as a general rule and everyone must know even without asking tips from the experts, to stay safe one must know the basic vigilance. Now the question is how. This is how: Keep your security software updated and run it regularly. Click only on links from trusted sources; the same goes for buying cellphone apps. Be smart about where and how you navigate in cyberspace.

    Five areas where scammers are most likely to be on guard for possible victims:

    Ransomware. The scam starts with malicious attachment like any other scam, as soon as you click of the scammer’s email or instant message or you visit a scammer website that usually lure you with enticing videos or promos, ransomware will lock your computer, usually displaying a screen message that appears to be from a law enforcement agency. Pay us, you’re told, and you’ll get back control of your computer. Once considered a niche scam, ransomware attacks exploded in 2012, hitting some 70,000 computers per month. About 3 percent of victims pay the ransom fee — thanks, in part, to cyber-criminals increasingly using online payment methods to collect, says cyber-security firm Symantec, which recently published a detailed report on this ruse. “In 2013, attackers will use more professional ransom screens, up the emotional stakes to motivate their victims, and use methods that make it harder to recover once compromised,” predicts Symantec’s Kevin Haley.



Leave a Response

Fields marked * are required

No file selected (must be a .jpg, .png or .gif image file)

Once published, you will have 15 minutes to edit this response.


My Interests

  • Industrial Design
  • Environmental Design
  • Communication Design
  • Fashion Design
  • Audio/Visual Design