• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Friday, November 14, 2025
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
Remita Remita Remita
ADVERTISEMENT
ADVERTISEMENT

Cybercrime: How to protect against five top cyber attacks in 2016

Elizabeth EdoziebyElizabeth Edozie
15/02/2016
in Consumer Technology
Reading Time: 3 mins read
1 0
A A
0
Computer Hackers

Computer Hackers

ADVERTISEMENT

Cybercrime is now regarded as one of the most dangerous threats posed to businesses because of its serious impact on growth and a country’s economy at large.

Government entities, non-profit organizations, private companies and citizens are all potential targets of several cybercriminal syndicates on the prowl on the widely-used Internet.

Prevention of cybercriminal activities has now become a critical aspect in the fight against cybercrime. Its mainly based on the concepts of awareness and information-sharing.

A proper security posture is the best defense against cybercrime, according to experts’ prescriptions. Every single user of technology must be aware of the risks of exposure to cyber threats. They should be educated about the best practices to adopt in order to reduce and mitigate those risks.

Which is why Microsoft, a global tech company, has predicted five critical cyber security threats that businesses need to watch out for and take protective measures against in the year 2016 and beyond.

The first critical cyber security threat is that mobile malware growth will result in more security issues. Microsoft predicts that 2016 is that year when cyber criminals will focus on targeting mobile devices by attacking underlying operating systems and releasing more malware-infected apps.

A mobile phone user hold the Nokia 103
A mobile phone user holding the Nokia 103

The adoption of mobile payment systems will also lead to a surge in hacking activities-related to stealing information from new payment processing technologies like EMV credit cards, contactless RFID smart cards and mobile wallets like Apple Pay and Google Wallet.

Microsoft advises users to prevent this by ensuring sensitive data protection through the use of built-in encryption capabilities like Enterprise Data Protection and BitLocker.

Secondly, Trend Micro, a Microsoft partner predicts rapid growth in online extortion and hacking, which is expected in to shoot up 2016 as more sophisticated ways are now open to steal information and gain control of web-enabled devices.

Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise
Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise

Trend Micro views that malware programs, like ransom-ware, are potentially one of the most dangerous types of computer malware which might be used more frequently by hackers to encrypt the victim’s personal information like photos or conversations and extort money online to regain control of online accounts and devices.

 

Ransom-ware attack can be prevented by carrying out the following preventive measures:

  • Scrutinize emails before opening them
  • Avoid clicking embedded links found in unverified emails
  • Back up your important files
  • Regularly update software programs and applications
  • Use a layered protection suite

The third cyber threat is spear phishing attack, which is an e-mail spoofing fraud attempt more likely conducted by perpetrators out for financial gain, trade secrets or military information that targets a specific organization seeking unauthorized access to confidential data.

This type of cyber threats which was formerly limited to email and SMS phishing is now commonly used by hackers creating password recovery scams. All a criminal hacker needs is the victim’s email address and a mobile phone number to start a password recovery process and compromise their victims’ accounts.

Microsoft advises that businesses should enlighten their customers on the need for built-in threat protection on PCs and devices with Windows Defender. And also, partners need to help customers to detect and get alerts about security breaches with Advanced Threat Analytics (ATA) as part of the Microsoft Enterprise Mobility Suite (EMS), according to the tech company.

The fourth cyber threat predicted by Microsoft is sophisticated use of social engineering and spear-phishing tactics by cyber criminals to manipulate control systems and gain initial access to the steel mill’s office network, which can cause physical damages such as damages to equipment.

 

Microsoft warns its partners to back up and run their customers’ businesses with “Azure Site Recovery”, which automatically recovers solution in the cloud in the event of this type of hack attack.

The fifth cyber threats are the attacks on devices that connect to IoT (Internet of Things). Internet of things is a network of physical objects such as devices and other items that can collect and exchange data via a connectivity without human interference.

Related Articles

NIN: Nigeria’s national social register captures 90 million Nigerians 

Galaxy Backbone pitches one petabyte storage capacity for AI

Tinubu urges editors to defend truth in social media era

FG targets paperless cabinet by December 2025 in digital governance push

Nigeria to unlock ₦14.38trn from digital economy reforms 

Nigeria upgrades tertiary connectivity: NgREN now linked with TERAS platform

AfDIC plans to onboard 30 million artisans on unified digital platform 

Moniepoint unveils ‘M’, AI chatbot to offer insights into Nigeria’s informal economy

FG plans WhatsApp AI chatbot for Nigerian youths 

Nigeria’s ex-cybersecurity director flags ‘structural and regulatory misalignments’ of National Digital Economy and e-Governance Bill 2025

Hackers can easily access private or secure networks on devices that connect to IoT through Bluetooth or Wi-Fi, thereby causing mobile device-driven attacks.

IoT devices can be protected with the use of Microsoft Intune, which provides mobile devices management, mobile application management, and PC management capabilities from the cloud with tools such as comprehensive setting management for mobile devices, including remote actions such as passcode reset, device lock, and data encryption, Microsoft says.

Share19Tweet12Share3SendShare
Previous Post

NYSC to intending Corpers: Disregard Internet messages from cyber criminals

Next Post

Nigeria: ONEm, MTN jointly tap mobile opportunities

Elizabeth Edozie

Elizabeth Edozie

Technology Journalist @Technology Times 08077671659 elizabeth.edozie@technologytimes.ng

Related Posts

GSM base station
News

Ericsson to acquire software developer, Ericpol

byKayode Oladeinde
20/10/2015
Dr Mike Adenuga, Chairman, Globacom Limited, owners of Glo Mobile Benin
News

Glo ‘roamances’ 100 new global partners

byrasheedat hassan
18/07/2014
A telecoms mast
Market Updates

Siemens, Huawei completes key LTE test

byDonatus Anichukwueze
04/05/2016
Mr. Phuthuma Nhleko, Executive Chairman of MTN Group
News

MTN Group lifts shares caution as Nigeria cuts fine to N330b

byKolade Akinola
14/06/2016
covid-19-exposure-notifications-smartphones
Opinion

Why is COVID-19 Exposure Notifications now on your phone?

byNat Cole
21/06/2020
The Big Story

‘Even if it’s limited service, 5G will launch August 24 in Nigeria’

byTechnology Times Staff
25/05/2022
African nations should launch an aggressive drive to harness the power of technology, particularly data-driven agriculture to address food security across the continent, Mr Kunle Awosika, Microsoft Managing Director, Africa Transformation Office (ATO) says. 
News

Microsoft’s Awosika says data-driven Agriculture can lift Africa

byTechnology Times Staff
30/03/2023
Oxygen Broadband Network
Market Updates

Computer Village Nigeria | What really makes this market tick?

byTechnology Times Staff
22/09/2017
fbi-cisa-warn-software-makers-of-security-flaws
News

FBI, CISA warn software makers of flaws exploited by cybercriminals

byFejiro Awowede
13/02/2025
ngcert-warns-of-anatsa-banking-malware
News

ngCERT: Anatsa, malware stealing banking data, hits 70,000 Android devices

byOladapo Riliwan
11/07/2024
Next Post
e-commerce

Nigeria: ONEm, MTN jointly tap mobile opportunities

MTN Afrinolly

TT Archives: MTN Group sells minority stakes in Nigeria ops to Shanduka Group of South Africa

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

one × four =

Latest Articles

nin-nigeria-national-social-register-links-90-m

NIN: Nigeria’s national social register captures 90 million Nigerians 

13/11/2025
galaxy-backbone-boosts-storage-capacity-for-ai

Galaxy Backbone pitches one petabyte storage capacity for AI

13/11/2025
tinubu-urges-editors-defend-truth-social-media

Tinubu urges editors to defend truth in social media era

12/11/2025
fg-targets-paperless-cabinet-by-december-2025

FG targets paperless cabinet by December 2025 in digital governance push

12/11/2025
nigeria-unlock-₦14-38trn-from-digital-economy

Nigeria to unlock ₦14.38trn from digital economy reforms 

12/11/2025
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT
eGovernance Nigeria Magazine eGovernance Nigeria Magazine eGovernance Nigeria Magazine
ADVERTISEMENT

POPULAR ARTICLES

  • nin-nigeria-national-social-register-links-90-m

    NIN: Nigeria’s national social register captures 90 million Nigerians 

    59 shares
    Share 24 Tweet 15
  • Galaxy Backbone pitches one petabyte storage capacity for AI

    58 shares
    Share 23 Tweet 15
  • Tinubu urges editors to defend truth in social media era

    50 shares
    Share 20 Tweet 13
  • Moniepoint unveils ‘M’, AI chatbot to offer insights into Nigeria’s informal economy

    57 shares
    Share 23 Tweet 14
  • Minister: In a world’s first, Nigeria establishes National AI Trust

    131 shares
    Share 52 Tweet 33
  • FG plans WhatsApp AI chatbot for Nigerian youths 

    54 shares
    Share 22 Tweet 14
  • Nigeria unfolds first-of-its-kind digital environmental certification in Sub-Saharan Africa

    61 shares
    Share 24 Tweet 15
  • Nigeria eases renewals with contactless passport tech, NIS says

    63 shares
    Share 25 Tweet 16
  • Nigeria upgrades tertiary connectivity: NgREN now linked with TERAS platform

    53 shares
    Share 21 Tweet 13
  • Nigeria to unlock ₦14.38trn from digital economy reforms 

    55 shares
    Share 22 Tweet 14

Latest Videos

  • TT TV
data-privacy-and-nigerias-online-consumers

Data privacy and Nigeria’s online consumers | Technology Times Live TV

11/08/2025
9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

08/08/2025
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
Load More
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

Phone: +234 (0) 1 454 1818
WhatsApp: +234 (0) 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

  • credicorp-portal-for-nigeria-consumer-credit

    CREDICORP: FG opens portal on www.credicorp.ng for Nigerians to access consumer credit

    15713 shares
    Share 6285 Tweet 3928
  • CUG: NCC caps call rate at ₦50, bans data bundling

    5054 shares
    Share 2022 Tweet 1264
  • 9mobile rebrands today, targets multibillion-naira comeback in mobile market

    4401 shares
    Share 1760 Tweet 1100
  • Exclusive: Boardroom battle erupts at 9mobile, threatens spectrum trade deal with MTN

    3883 shares
    Share 1553 Tweet 971

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.