The Online Threats of 2019

How you can stop them from happening.

Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

Hacking

We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

Identity Theft

A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

Ransomware

Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

Sextortion

If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

Last thoughts

So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

Read more about VPNs here

There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

Cybersecurity by Acunetix

Comments

2 responses to “The Online Threats of 2019”

  1. […] According to the World Bank, there were 1.7 billion people with no bank account in 2017. This situation is worst in developing countries, especially African ones. For example, over 62 million of these people lived in Nigeria. Besides, data from Google Trends reveal that Lagos, one of Nigeria’s biggest cities, ranks globally as the number one city based on the volume of online searches for Bitcoin (BTC). Clearly, for the city’s 21 million-odd people, there an immense interest in some form of an accessible payment system. Of course, it’s unrealistic to expect bank branches to magically appear in every remote corner of the world. However, a digital database using Blockchain technologies has the potential to reach far beyond physical banks. Many Africans value trust and transparency. In developing countries, this lack of trust goes beyond the Internet. Developing countries with less industrialization tend to have higher levels of corruption. This reduces national investment opportunities in the public sector and instils a lack of trust in centralized oligarchs handling international investment. Because its power lies within the community of users, Blockchain can combat these trust issues. All data logs and amendments must pass through this community and identification confirmation tests. Blockchain technology also secures its data incredibly. Hacking and data breaches are all too common nowadays. In 2017, for example, around 3 billion Yahoo user accounts were stolen. When information is stored in the same place, hackers have one, easy target. In contrast, Blockchain is a distributed entity. This dissemination of data leaves it far less vulnerable to cyberattacks. […]

  2. […] extra sensitive data like patents, medical and financial records/accounts.  Read our feature on Online Threats for more on […]

Leave a Reply

Your email address will not be published. Required fields are marked *

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.