This is to explain simply and visually to the sort of computer user who can’t
begin to fathom why miscreants would want to hack into his PC. “I don’t
bank online, I don’t store sensitive information on my machine! I only
use it to check email. What could hackers possibly want with this hunk
of junk?,” are all common refrains from this type of user.
One of the ideas I tried to get across with this image is that nearly
every aspect of a hacked computer and a user’s online life can be and
has been commoditized. If it has value and can be resold, you can be
sure there is a service or product offered in the cybercriminal
underground to monetize it. I haven’t yet found an exception to this
rule.
No comments:
Post a Comment