Earlier this year, the news came out that hackers stole email addresses, passwords, and IP addresses from 2.5 million PlayStation and Xbox gamers via two popular gaming forums. While the incidents were disclosed only in 2016, more than one billion Yahoo accounts were breached in incidents stemming from a few years ago—making it the largest breach experienced by a single company. Even the Internal Revenue Service (IRS) has been hit, in 2015 and in early 2016, affecting tax returns and social security numbers.
Websites and servers aren’t the only points of vulnerability. As more of our everyday electronics get connected, they can also become open to attack. For example, last fall, a distributed denial of service (DDoS) attack caused by the Mirai botnet brought down popular websites such as Amazon, Netflix, and Twitter. The botnet attacked CCTV video cameras and DVRs. Indeed, DDoS attacks are on Wired’s list of the biggest security threats for this year, along with ransomware, weaponized consumer drones, and another iPhone encryption clash.
In its 2016 Internet Crime Report, the Federal Bureau of Investigations (FBI) notes that its Internet Crime Complaint Center (IC3) has logged more than 3.7 million complaints since the center was formed in May 2000. In 2016 alone, 298,728 complaints tracked by the center amounted to more than $1.3 billion in reported losses. As RSA notes in its white paper, “2016: Current State of Cybercrime:” “From mobile threats and ransomware to the role of biometrics in reducing fraud, a myriad of threats exist across the cyber landscape and the commoditization of cybercrime is making it easier and cheaper to launch attacks on a global scale.”
Too many perceive security to be expensive, time-consuming, and/or difficult to implement. But there are ways to make things difficult enough to dissuade hackers—and to do so without adding too much to the bill of materials (BOM). After all, a breach can be far more costly in terms of lost revenue as well as brand reputation and customer loyalty.
White Paper: Essential Tips About Design Security
Maxim has a new white paper, “Why Hardware-Based Design Security is Essential for Every Application,”that dispels the misconceptions around implementing design security. Read the paper for a better understanding of why hardware-based security is a much more robust option than its software-based counterpart. Learn how easy and cost-effective hardware-based security can be when using embedded security technology. Read the white paper today and safeguard your next design against the prying reach of cybercriminals.