• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

The Tech Block

tech tips from tim the techie

  • Home
  • About
  • Blog
  • Business Tech
  • Finance Tech
  • Gaming
  • Home Tech
  • Phone
  • Travel Tech
  • Web
  • Contact Tim

The Changing Face of Online Security

February 18, 2021

Having been in the mainstream since the turn of the new millennium, the internet has been a growing target for bad actors. Cracking, hacking, and negative behavior of all types permeates the evolution of the internet and continues to this day. Yet, despite being such an active component, many of the specific forms of attack have evolved considerably. Taking a look back and comparing some classic hacks to their contemporary counterparts and their solutions, we want to see how much has changed.

The Dreaded Popups

Online advertising in the older internet was the wild west, where the unavoidable bandits were the ever-present popup ads. Simply browse a website and you could have two or three pop-ups appear, with each loaded window producing more in a seemingly endless loop. To combat this, many users turned to ad-blockers.

In response to ad-blocking software, the entire shape of the online advertising world changed. Ads of reputable websites are now held to strict standards, where pop-ups are avoided in the mainstream. This mean ad-blockers were no longer necessary in most cases, but there was still the risk of malvertisement.

Malvertisement is where regular trustworthy ads are intercepted and replaced by damaging alternatives. These can install malware on a person’s computer, effectively recreating the threats of older popups. The solution to this problem is found on the publisher side, where websites can use protection services to prevent ingress from malvertisement, again rendering legitimate sites safe if implemented.

Password Hacking

The hacking of a person’s passwords used to be as simple as basic brute force attacks. In these, hackers would simply run through lists of common passwords or every password possible until a match was found, giving them access. Protecting against these hacks was annoying, but could be generally accomplished through longer passwords and the addition of numbers and symbols.

Today, the growth of the internet has made these attacks change tack. Though brute-forcing longer a password is less possible than ever due to anti-flooding solutions, there are other avenues. These are usually found through data breaches on major platforms, where user information is stolen. This information is then cross-referenced, where AI can predict the same user using the same password on another site. Preventing this unfortunate reality can now be accomplished through using unique passwords for every site, or utilizing two-factor authentication wherever possible.

Direct Malware Programs

The early internet was flooded with ostensibly helpful software that performed some positive functions but had hidden malware beneath the surface. Toolbars were some of the most common examples of these in action, with others like Bonzi Buddy become memes in their own rights.

The big changes to direct installation malware predominately came from the development of trusted download sites. Illustrated by Google Play and iOS stores on mobiles, and the Windows Store on PC, these systems check data for users. In doing so, they maintain strict levels of compliance to avoid malware directly. The exception to this which must be noted is optional installers located on many random website programs, which can include piggybacked malware. In this instance, always going through the advanced installation process and removing extra programs should do the trick in keeping devices safe.

Toolbars by mdornseif, on FlickrAs we’ve grown so much alongside the internet, digital security has undergone fascinating evolution. It’s harder than ever for hackers to do damage directly, and so they had to become much wilier. That said, as long as you keep up-to-date with basic security measures like those outlined in this article, most users shouldn’t see a problem. Teaching your parents to abide by the same rules, however, might not be so easy.

 

Tweet
Pin
Share
0 Shares

Categories: Web

sidebar

Blog Sidebar

About Us

I’m Tim from The Tech Block. Tim Techy! haha. I’m all about gadgets, gaming and technology. I don’t just sit in my house all day playing around on gadgets, but they are very integrated into my everyday lifestyle. When I work out I use technology to track it, when I turn the heat on in my home, I use my computer to do it and when I travel, I take my fun techie stuff with me!

Popular Posts

Facebook

Tim's Tech Block

News Latter

Connect

  • Facebook
  • Instagram
  • Twitter

Recent Posts

  • How Emerging Tech is Enhancing Live Sports Betting Experiences
  • Elevate Your Home with the Perfect Lighting for Every Room
  • A Smarter Way to Cool, Protect, and Upgrade Your Space
  • Why Immigration Experts Are Essential for Business Success
  • Ultimate Guide to Crypto Sportsbooks for US Bettors

Categories

  • Blog
  • Business Tech
  • Finance Tech
  • Gaming
  • Home Tech
  • Phone
  • Travel Tech
  • Web

Footer

About Us

I’m Tim from The Tech Block. Tim Techy! haha. I’m all about gadgets, gaming and technology. I don’t just sit in my house all day playing around on gadgets, but they are very integrated into my everyday lifestyle. When I work out I use technology to track it, when I turn the heat on in my home, I use my computer to do it and when I travel, I take my fun techie stuff with me! Read More…

Popular

How Emerging Tech is Enhancing Live Sports Betting Experiences

Elevate Your Home with the Perfect Lighting for Every Room

A Smarter Way to Cool, Protect, and Upgrade Your Space

Why Immigration Experts Are Essential for Business Success

Featured Post

How Emerging Tech is Enhancing Live Sports Betting Experiences

Elevate Your Home with the Perfect Lighting for Every Room

A Smarter Way to Cool, Protect, and Upgrade Your Space

Why Immigration Experts Are Essential for Business Success

Facebook

Tim's Tech Block

Copyright ©2018 The Tech Block | All Rights Reserved