The Online Threats of 2019

How you can stop them from happening.

Like a biological virus mutates – as technology advances, so does the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

In order to keep these cybercriminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

Hacking

We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

Identity Theft

A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

Ransomware

Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

Sextortion

If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

Last thoughts..

So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

Read more about VPNs here

There are now more secure anti-hacking tools that use the Blockchain and offer great protection especially against identity theft. Have a look at our feature on Tokenisation.

Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

Cybersecurity by Acunetix

The latest cloud computing trends in 2019

It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get onboard with cloud-only software and platforms. Here are some of the trends to look out for this year:

Hybrid Cloud, Multi-Cloud and Mergers

IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

Mergers like these are likely to become a trend this year, as companies see the vast benefit of using multiple clouds across all sectors of their organization. Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the coming years.

Serverless Cloud

Serverless computing is a young market in technology, but it will continue growing in 2019. Serverless computing isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

Rather than buying server space, developers can simply use a back-end cloud service to code, only paying for the server space they actually use.

As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

Artificial Intelligence

Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. This is because according to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

Security

Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

Mitigating factors

The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. The GDPR affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

Cloud computing services are progressing exponentially, as are their new developments. As a result, 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing and implementing cloud technologies to their fullest extent.

Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
N26 Bank
N26 Bank

Smoother Online Shopping

As a small online business, it makes sense to ensure that what you are selling is very easy to access. This is especially important when offering something that is common. The purchasing process should be practical and aesthetically pleasing to your clients.

Your online shopping cart software creates that important connection between you and your customers. It must therefore help you achieve three goals:

-Deliver the best and most secure experience for your users;


-Make it simple and desirable for them to complete transactions;


Minimize common ecommerce hurdles (such as shopping cart abandonment).

Customers expect consistency, reliability, and speed. Most users are now accustomed to the speeds facilitated by broadband Wi-Fi and omnipresent LTE mobile networks.

Research indicates that 78 percent of ecommerce consumers completed a purchase on their mobile device in 2016.

This percentage has probably increased since then. Therefore, delivering experiences that embrace mobile best practices has to be one of your primary concerns as you choose a solution.

Some other salient things a good online shopping cart solution should pay attention to:

TRUSTis obviously a huge part of establishing a valuable relationship. Your shopping cart software is an extension of your brand, and your buyers must trust it with their personal and financial information.

As buyers avoid using direct credit card purchases (due to increasing fraud and data breaches) in favour of more secure methods. Your company must be prepared to offer new payment options.

Customers appreciate the SECURITY and ease of mobile wallet payments, such as Apple Pay and Google Pay. This is because they can complete purchases using a single-use virtual credit card number.

Give them the ability to use these alternative payments and if possible, do not exclude Cryptocurrency!

It would also need to link up to your MARKETING and customer service platforms to provide a holistic customer experience.

Naturally, you also want a system that tracks product sales and customer activity with as much detail as possible, and that can also sort transaction data across a multitude of categories.

So, where does one get such software?

Read more about how to get a good shopping cart software here.