1.Data could be modified
+ Accidentally through corruption.
+ Intentionally through malicious alteration.
2.Hashing is only good for accidentally modification/corruption,because a malicious attacker world simply modify the hash to evade detection.
3.Digital signatures use the sender's private key + a hash to guarantee the integrity AND the origin of a message,but it requires lots of OVERHEAD of a Public Key Infrastructure.