25.04.2013 Views

THE EXTREME FUTURE (Part 3)

THE EXTREME FUTURE (Part 3)

THE EXTREME FUTURE (Part 3)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1. Auto-Phishing<br />

Hackers set up wireless networks that<br />

people use to connect to the Internet<br />

when driving. Then the hackers use<br />

those autoconnections to steal<br />

personal information.<br />

2 Bank Morphing<br />

Hackers set up duplicate online bank<br />

sites to gain access to personal and<br />

corporate banking accounts<br />

3. DEPs<br />

Hackers create DEPs, digitally<br />

engineered personalities, that pose as<br />

the account holders to gain access to<br />

the funds in the accounts.<br />

4. ID Clones<br />

Hackers set up digital clones of real<br />

people with stolen identities and<br />

conduct global business, open<br />

accounts, transfer funds, make<br />

transactions, take out loans, and then<br />

disappear with the loot.<br />

5. Data Assassins<br />

Hackers kill off personal or corporate<br />

data history and set up new histories<br />

to create new identities to secure<br />

funds, contracts, products, services.<br />

etc.<br />

www.utm.my innovative . entrepreneurial . global 73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!