• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Monday, April 13, 2026
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
Remita Remita Remita
ADVERTISEMENT

Cybercrime: How to protect against five top cyber attacks in 2016

Elizabeth EdoziebyElizabeth Edozie
15/02/2016
in Consumer Technology
Reading Time: 3 mins read
1 0
A A
0
Computer Hackers

Computer Hackers

ADVERTISEMENT

Cybercrime is now regarded as one of the most dangerous threats posed to businesses because of its serious impact on growth and a country’s economy at large.

Government entities, non-profit organizations, private companies and citizens are all potential targets of several cybercriminal syndicates on the prowl on the widely-used Internet.

Prevention of cybercriminal activities has now become a critical aspect in the fight against cybercrime. Its mainly based on the concepts of awareness and information-sharing.

A proper security posture is the best defense against cybercrime, according to experts’ prescriptions. Every single user of technology must be aware of the risks of exposure to cyber threats. They should be educated about the best practices to adopt in order to reduce and mitigate those risks.

Which is why Microsoft, a global tech company, has predicted five critical cyber security threats that businesses need to watch out for and take protective measures against in the year 2016 and beyond.

The first critical cyber security threat is that mobile malware growth will result in more security issues. Microsoft predicts that 2016 is that year when cyber criminals will focus on targeting mobile devices by attacking underlying operating systems and releasing more malware-infected apps.

A mobile phone user hold the Nokia 103
A mobile phone user holding the Nokia 103

The adoption of mobile payment systems will also lead to a surge in hacking activities-related to stealing information from new payment processing technologies like EMV credit cards, contactless RFID smart cards and mobile wallets like Apple Pay and Google Wallet.

Microsoft advises users to prevent this by ensuring sensitive data protection through the use of built-in encryption capabilities like Enterprise Data Protection and BitLocker.

Secondly, Trend Micro, a Microsoft partner predicts rapid growth in online extortion and hacking, which is expected in to shoot up 2016 as more sophisticated ways are now open to steal information and gain control of web-enabled devices.

Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise
Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise

Trend Micro views that malware programs, like ransom-ware, are potentially one of the most dangerous types of computer malware which might be used more frequently by hackers to encrypt the victim’s personal information like photos or conversations and extort money online to regain control of online accounts and devices.

 

Ransom-ware attack can be prevented by carrying out the following preventive measures:

  • Scrutinize emails before opening them
  • Avoid clicking embedded links found in unverified emails
  • Back up your important files
  • Regularly update software programs and applications
  • Use a layered protection suite

The third cyber threat is spear phishing attack, which is an e-mail spoofing fraud attempt more likely conducted by perpetrators out for financial gain, trade secrets or military information that targets a specific organization seeking unauthorized access to confidential data.

This type of cyber threats which was formerly limited to email and SMS phishing is now commonly used by hackers creating password recovery scams. All a criminal hacker needs is the victim’s email address and a mobile phone number to start a password recovery process and compromise their victims’ accounts.

Microsoft advises that businesses should enlighten their customers on the need for built-in threat protection on PCs and devices with Windows Defender. And also, partners need to help customers to detect and get alerts about security breaches with Advanced Threat Analytics (ATA) as part of the Microsoft Enterprise Mobility Suite (EMS), according to the tech company.

The fourth cyber threat predicted by Microsoft is sophisticated use of social engineering and spear-phishing tactics by cyber criminals to manipulate control systems and gain initial access to the steel mill’s office network, which can cause physical damages such as damages to equipment.

Related Articles

Borno, Kashim Ibrahim University forge AI partnership

FG extends deadline for digital economy research clusters under Project BRIDGE

AfDB $200m loan to expand Nigeria fibre network to 120,000km

NITDA, UN hold talks on youth digital skills in Nigeria

Nigeria begins biometric passenger verification for domestic flights

UNILAG names Yinka-Banjo AI UniPod Director amid ₦30bn national rollout

Galaxy Backbone portal drives access to government services in Nigeria

Nigeria wants African nations to align digital strategy on AI, cybersecurity

FG targets growth with digitised public procurement

Nigeria’s digital literacy drive gains momentum as NOA, Commit Technology sign pact

 

Microsoft warns its partners to back up and run their customers’ businesses with “Azure Site Recovery”, which automatically recovers solution in the cloud in the event of this type of hack attack.

The fifth cyber threats are the attacks on devices that connect to IoT (Internet of Things). Internet of things is a network of physical objects such as devices and other items that can collect and exchange data via a connectivity without human interference.

Hackers can easily access private or secure networks on devices that connect to IoT through Bluetooth or Wi-Fi, thereby causing mobile device-driven attacks.

IoT devices can be protected with the use of Microsoft Intune, which provides mobile devices management, mobile application management, and PC management capabilities from the cloud with tools such as comprehensive setting management for mobile devices, including remote actions such as passcode reset, device lock, and data encryption, Microsoft says.

Stay ahead with real-time reports, breaking news, and exclusive insights delivered directly to your phone. Don't settle for outdated information. Join TECHNOLOGYTIMES NEWS on WhatsApp for 24/7 updates.

Join Our Whatsapp Channel
Share20Tweet12Share3SendShare
Previous Post

NYSC to intending Corpers: Disregard Internet messages from cyber criminals

Next Post

Nigeria: ONEm, MTN jointly tap mobile opportunities

Elizabeth Edozie

Elizabeth Edozie

Technology Journalist @Technology Times 08077671659 elizabeth.edozie@technologytimes.ng

Related Posts

News

Visa study reveals Mobile Money drives demand for financial services in Nigeria

byTechnology Times Staff
25/10/2012
Cross section of attendees at TECH+
News

Nigeria opens entries for ITU Young Innovators competition

byKayode Oladeinde
01/08/2015
naira-scarcity-starlink-lifts-digital-financial-inlcusion-nigeria
The Big Story

Naira Scarcity: Starlink to lift digital financial inclusion in Nigeria, NCC says

byTechnology Times Staff
16/02/2023
telecoms-leaders-push-for-criminal-sanctions
News

Telecoms stakeholders to lawmakers: ‘Criminalise attacks on infrastructure or risk digital blackout”

byFejiro Awowede
06/05/2025
digital-id-lagos-state-to-connect-diaspora
News

Digital ID: Lagos State launches drive to connect diaspora residents

byIretomiwa Balogun
16/04/2025
News

Mobile number porting is not mandatory for phone subscribers, NCC says

byTechnology Times Staff
23/04/2013
Nigeria and Tunisia are to strengthen the bilateral relations between the two countries especially in the areas of trade, economy and technology.
News

Lagos, Microsoft, others train 100 youths on ICT skills

bySuccess Kafoi
23/11/2016
Samson Isa, Clickatell West Africa Director
News

Kalahari award honours Clickatell

byTechnology Times Staff
08/06/2015
Apple TV app debuts on Android
Consumer Technology

Apple TV app debuts on Android

byFejiro Awowede
13/02/2025
quickteller-and-four-apps-to-boost-productivity
Consumer Technology

QuickTeller and four apps to boost your productivity

byAbdulraheem Olanrewaju Abdulraheem
09/04/2024
Next Post
e-commerce

Nigeria: ONEm, MTN jointly tap mobile opportunities

MTN Afrinolly

TT Archives: MTN Group sells minority stakes in Nigeria ops to Shanduka Group of South Africa

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

one × five =

Latest Articles

borno-kashim-ibrahim-university-partner-on-ai

Borno, Kashim Ibrahim University forge AI partnership

13/04/2026
fg-extends-deadline-for-research-project-bridge

FG extends deadline for digital economy research clusters under Project BRIDGE

12/04/2026
afdb-200m-loan-to-expand-nigeria-fibre

AfDB $200m loan to expand Nigeria fibre network to 120,000km

11/04/2026
nitda-un-hold-talks-on-youth-digital-skills

NITDA, UN hold talks on youth digital skills in Nigeria

11/04/2026
nigeria-begins-biometric-passenger-verification

Nigeria begins biometric passenger verification for domestic flights

10/04/2026
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT

Most Read

  • NCC: Automatic compensation for telecoms subscribers begins April

    NCC: Automatic compensation for telecoms subscribers begins April

    74 shares
    Share 30 Tweet 19
  • AfDB $200m loan to expand Nigeria fibre network to 120,000km

    63 shares
    Share 25 Tweet 16
  • SEC: e-Dividend portal upgrade tackles unclaimed dividends

    264 shares
    Share 106 Tweet 66
  • Galaxy Backbone portal drives access to government services in Nigeria

    59 shares
    Share 24 Tweet 15
  • UNILAG names Yinka-Banjo AI UniPod Director amid ₦30bn national rollout

    58 shares
    Share 23 Tweet 15
eGovernance Nigeria Magazine eGovernance Nigeria Magazine eGovernance Nigeria Magazine
ADVERTISEMENT

Latest Videos

  • TT TV
data-privacy-and-nigerias-online-consumers

Data privacy and Nigeria’s online consumers | Technology Times Live TV

11/08/2025
9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

08/08/2025
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
Load More
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

WhatsApp: +234 201 454 1818
WhatsApp: +234 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

  • credicorp-portal-for-nigeria-consumer-credit

    CREDICORP: FG opens portal on www.credicorp.ng for Nigerians to access consumer credit

    15745 shares
    Share 6298 Tweet 3936
  • CUG: NCC caps call rate at ₦50, bans data bundling

    5060 shares
    Share 2024 Tweet 1265
  • 9mobile rebrands today, targets multibillion-naira comeback in mobile market

    4419 shares
    Share 1768 Tweet 1105
  • Exclusive: Boardroom battle erupts at 9mobile, threatens spectrum trade deal with MTN

    3892 shares
    Share 1557 Tweet 973

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.