Tag: cybersecurity

  • Digital vulnerabilities

    Digital vulnerabilities

    Global security breaches are on the rise and no one or country is safe. The acceleration of certain technologies has been rapid since the pandemic engulfed the world last year. But unfortunately, we’ve also become slack in the process.

    Once again, it has become apparent just how ‘at-risk’ our data is.

    Data hacks have been frantic and are now getting major press attention. It’s hard to know who each unwanted visitor is in each case but fingers are being pointed in perhaps familiar directions.

    Russian invaders back at it again

    In fact, throughout June, Russians have been blamed for a slew of hacks around the world.

    Microsoft in late May said a wave of Russian cyber-attacks had targeted government agencies and human rights groups in 24 countries, mostly in the US.

    It claimed that around 3000 email accounts of more than 150 different organizations, some of them international, were attacked in just one week.

    Allegedly, the group responsible was the same one that carried out 2020’s SolarWinds attacks, which the Russian Foreign Intelligence Service (SVR) was accused of orchestrating.

    But the Kremlin denied having any knowledge or anything to do with any cyber-attacks. It challenged Microsoft to how these attacks were linked to the European attacks.

    Nevertheless, authorities are now aggressively investigating cybercrime. In the first week of June, the US Justice Department recovered around $2.3m in cryptocurrency ransom money.

    Webscanner

    This was part of the funds paid by the Colonial Pipeline Company to Russian hackers in the most disruptive cyberattack on record in the country.

    The US deputy attorney general Lisa Monaco said investigators had seized 63.7 Bitcoins which was paid by the company after its systems were hacked, leading to massive shortages of petrol along the US’s East Coast. The department said it founded and recaptured the majority of the ransom.

    The hackers are believed to be a group called DarkSide, whose menace caused a multi-day shutdown in certain petrol stations and a spike in gas prices.

    The attack made international news and prompted the US’s White House to encourage business executives to improve security measures to avoid future cyberattacks whatever their nature, ransomware or otherwise.

    The FBI said DarkSide had also disrupted operations at a meatpacking company. As no one tends to be spared in the spillover effects, it is always a good idea to protect your company’s digital assets as a preventative measure.

    Not so sophisticated

    The attackers rather proved to be quite ‘amatuerish’ because they sent the Bitcoins to an online platform to convert it to fiat money – and that is how they got nabbed. Server-hosted (Online) crypto exchanges are obliged to keep customer data for compliance and anti-money laundering practices. So while your Crypto digital wallet does not reveal your identity, pairing it with an exchange will link it to all the other particulars you needed to provide to use the exchange.

    As long as you need cash to pay for things you will always need to switch your crypto in some way or another – unless your recipient agreed to take payment in Crypto as well. Keeping your digital assets on a hard-wallet or on your hard-drive keeps them “off-the-grid”. But also means you can’t actually spend them.

    Although the initial cyberattack was a smart manuever, the attackers proved to be rookies at the robbing game in the end.

    On a positive note: the ability to retrieve Bitcoins actually reinforces the need for a Blockchain-based financial system. This made it easier for the authorities to track movements of the ‘ransom-paid’ Bitcoins.

    Cuban for a bruising

    But politicians aren’t the only people who are urging businesses, civil society organizations, and other groups to improve security systems and be cognisant of an often-dark future.

    US Dollar billionaire Mark Cuban has also called for stricter cryptocurrency regulations.

    The owner of the Dallas Mavericks who has been investing in trading Bitcoin and other cryptocurrencies such as Ethereum said the world was in dire need of regulation for the burgeoning decentralized finance (DeFi) space.

    READ MORE ABOUT DEFI HERE

    Cuban said in an interview with Bloomberg that there “should be regulation to define what a Stablecoin is” in order for DeFi to be reliable and to prevent total collapses in investments.

    This comes after he saw his investments in a particular Stablecoin ‘went to zero’. Cuban claimed he had been scammed.

    Stablecoins are a type of cryptocurrency that is pegged to an underlying asset, or currency – usually the US dollar. They are the earliest forms of DeFi and the largest Stablecoin, Tether, is currently worth more than $62bn.

    DeFi has helped the price of Ethereum, the blockchain on which most DeFi projects are built, to also soar. But they can be highly risky investments.

    Investors try to create arbitrage opportunities and liquidity between coins but such a scheme collapsed for Cuban.

    “There should be regulation to define what a stable coin is and what collateralization is acceptable,” he said.

    trade cryptos
    Buy, Stake, and Trade Cryptos

    Strong words of caution

    Cuban hasn’t revealed how much money he lost but told a fellow DeFi investor via Twitter that regulation must be implemented- and quickly.

    It had been suggested that Cuban was “rugged” which refers to when a project’s liquidity dries up and investors cannot withdraw their cash.

    Mark Cuban is alleged to have 60% of his crypto holdings in Bitcoin, 30% in Ethereum, and 10% held in other coins. He likes to experiment with new financial tech investments.

    He added further in a recent blog post that banks should be scared of unregulated DeFi technology.

    All crypto-based investments remain highly risky as the technology around them develops. But there certainly needs to be global laws to prevent people from losing hefty amounts of their wealth/investment. Cryptocurrency is without a doubt a very lucrative investment vehicle that could make you an overnight millionaire. But that also makes it a perfect vehicle for scammers to clone projects to make away with your hard-earned cash.

    You must, therefore, be extra vigilant and scrutinize offers for instant riches. But more so, you would be quite negligent these days to navigate the Internet without any form of cyber-protection.

  • Be Digitally hack-proof

    Be Digitally hack-proof

    Why do people hack systems? Hacking is a technique used to compromise any digital device. Hackers want to get into your device to use your data for varied reasons – naturally, most of these motives are financially driven.

    A data breach is usually what leads to a hack. There is a difference even though both terms are used interchangeably.

    A data breach happens when data that is left vulnerable in an unsecured environment gets viewed by someone who shouldn’t have access to it.

    While hacks are the result of malicious behavior, breaches happen as a result of negligence, human error, or other non-malicious behavior that creates a security vulnerability.

    Hackers may access your device just to say they could or for financial gain, to protest, or to gather sensitive information.

    So what makes a hacker?

    In the past, a hacker may have been a whiz kid or specialized programmer but in the modern-day, hacking has become easier and more people are becoming hackers. As more people shop online and use computers for everyday tasks, they become the prey of hackers worldwide.

    Actual hacking is technical in nature – the hacker does not communicate with the person whose PC they are hacking into.

    But they can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics are referred to as social engineering.

    Your cellphone too can be hacked

    While most associate hacking with Windows computers, the Android operating system also offers an inviting target for hackers. That means millions of people who use Samsung phones can be hacked.

    Some fifty years ago, there was a name for hackers who obsessively explored low-tech methods for getting around the secure telecommunication networks and expensive long-distance calls. they were called phreaks.

    This was a portmanteau of the words phone and freaks. They were a defined subculture in the 1970s, and their activity was called phreaking.

    Phreakers have now evolved out of the ‘analog technology era’ to become hackers in the digital world. They are beyond a sub-culture and have become a genuine threat to the safety of our information and data.

    Mobile phone hackers currently use a variety of methods to access your mobile phone and can intercept phone calls, voicemails, text messages, and even the phone’s microphone and camera, all without your permission or even knowledge.

    iPhones are not safe either

    In 2020, many journalists working for Al Jazeera were victims of a sophisticated zero-click spyware attack.

    The Toronto-based internet watchdog group Citizen Lab was asked to look into the attacks, which took place in July and August, and they released their findings at the end of December.

    The report found that 36 journalists, producers, anchors, and executives had their iPhones compromised by Pegasus spyware. The spyware, developed and sold by an Israeli-based firm called NSO Group, targets security vulnerabilities in the iMessage app.

    The so-called “zero-click” exploit deploys without any user interaction. Once installed, it can record ambient sound and phone conversations, take pictures, and access user credentials. It sounds like science fiction but it’s very much real!

    Types of hacks

    Malware

    People can use hardware to sneak malware into your PC. In offices, hackers will infiltrate networks by giving staff members infected USB sticks, dodgy USB cables, and mouse chords.

    It is crucial to always think before plugging anything into your work or personal device with access to confidential data.

    Educate your staff about being careful before plugging anything into their PCs.

    Malware infections generally occur when users interact with dangerous code by clicking on a URL or downloading malicious software disguised as an authentic program. But zero-click spyware penetrates devices without any user interaction.

    Citizen recommends making sure that your mobile OS is updated to the latest version. Identified vulnerabilities in previous versions of iOS were patched in the iOS 14 update.

    Practicing good digital hygiene is always important for the security of your mobile devices.

    Use sites like haveibeenpwned.com and breachalarm.com to see if your email credentials have been compromised. Use strong passwords on any apps that contain sensitive data and delete any apps that you do not regularly use.

    Missing security patches

    Always remember to update your security tools. Too many people ignore update notifications or security patches, leaving themselves vulnerable. It’s not just antivirus software that needs patching.

    Tell your staff to ensure that all their antivirus and applications are routinely updated as security patches become available. This task is usually the job of your IT department if you have one in the first place.

    Getting your password information

    Hackers can obtain your credentials through several means, but commonly they do so through a practice called keystroke logging or keylogging.

    Can you believe that the most common password is “123456”? Hopefully, yours isn’t so, or any of the most hacked passwords in the last 10 years.

    Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

    This and other forms of spyware are malware that tracks your activity until a hacker has what they need to break into your system.

    Attackers can deploy malware on a user’s machine if they are in your environment and capture your credentials via keylogging too.

    Hackers also use password cracking programs that can run letter and character combinations, guessing passwords in a matter of minutes, or even seconds.

    To get around this, use a password management tool that securely houses your company’s credentials. These tools can often auto-generate lengthy, diverse character passwords that are difficult for hackers to guess. They can also autofill for your employees for easy access to their tools.

    Encryption and multi-factor authentication methods also offer more layers of protection.

    Distributed Denial-of-Service (DDoS)

    Acunetix

    This technique involves taking down a website so that a user cannot access it or deliver their service. DoS attacks take place when hackers inundate a target’s server with large influxes of traffic. The amount is so frequent and high that it overloads the server by giving it more requests than it can handle. This crashes your server and your company’s website.

    Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is a synchronized attack on more than one server or website, potentially taking down numerous online assets. 

    A good method to fight DDoS attacks is to use cloud protection services to spot them – like Acunetix or Netsparker.

    Social Engineering & Phishing

    This is where hackers try to get your personal information, often by impersonating a legitimate and maybe trusted source.

    Many types of social engineering bait come in the form of phishing emails.

    A hacker sends you a message that looks like it’s from someone you know, asking you to do something, like wire them money, or to click or download an infected attachment to see more. 

    Here is a hilarious example of a phishing Email

    “The top malicious email attachment types are .doc and .dot which make up 37%. The next highest is .exe at 19.5%,” according to a report by Symantec. Always be cautious of opening these types of attachments.

    Warn your employees to never give out private business information over email, to think before opening any attachments, and educate them on mail scams.

    Use email software that scans for phishing. Microsoft 365 and Google’s Business packages come equipped with such. Google’s tech uses AI to scan the content and find things such as spelling errors and dodgy URLs. This enables the system to block them before they even hit your inbox.

    Most people or companies that get hacked or suffer from a data breach do so mainly due to negligence. Many do not prioritize beefing up their security systems before it is too late. Hacks are, however, completely avoidable so don’t fall victim to them.

    Other ways to protect yourself

    • Download a reliable anti-malware product that can both detect and neutralize malware and block connections to malicious phishing websites.
    • Of course, whether you are on Windows, Android, a Mac, an iPhone, or in a business network, you must always use layered protection wherever you can.
    • Only download phone apps from the legitimate marketplaces that police themselves for malware-carrying apps, such as Google Play and the Apple/Amazon Appstore.
    • Check the ratings and reviews first. If it has a low rating and barely any downloads, it might be best to avoid that app.
    • Use long and complex passwords. Don’t use numbers in sequence. You can also use mixes of letters that can be remembered through rhymes.
    • Consider using a password manager.
    Advert
  • 2020: Year of the PC

    2020: Year of the PC

    People will always find an opportunity in a crisis. This year has been one of the strangest years we will ever experience. Because of the global pandemic, we have been ‘shut-in’ physically and mentally. Hiding in our homes in an effort to save the lives of the elderly and sickly.

    Technologies that enable people to communicate with each other from different locations and work remotely have had an excellent year because of this.

    Who needs phones & email?

    The pandemic may have stopped us from having face-to-face meetings because of self-isolation and social distancing. So just like that, we all needed to have online meetings and digital collaborative meetups.

    In 2020, we just stopped phoning people. We needed to see what other humans looked like. So, we engaged more in video calling, using whatever technology available that supports that functionality.

    The online video-conferencing tool Zoom, therefore, went from being a company you’d probably never heard of, to global ‘overnight’ success. It was founded in 2011 by Eric Yuan, a former Cisco engineer, and executive, who then launched it in 2013 as software for companies. It was valued at $1bn in 2017 because it enjoyed very strong revenue growth and was easy to use, and became profitable in 2019, and listed on the Nasdaq.

    “You’re on Mute! “

    Quote of 2020

    Come early 2020, Zoom entered a boom period as most of us used it while in quarantine. Its share price, therefore, grew more than 490% from $68.72 to around $406.

    MS Teams, Microsoft’s answer to Zoom. is believed by many to be more reliable and secure than Zoom – which suffered a major breach earlier in the year. Google’s Meet also features on the list of top video calling/conferencing apps.


    We won’t delve into comparison here. The pros and cons are highly dependant on what you use it for and your business size/budget. The usage stats below speak volumes though albeit just for the two major economies.

    Other tools

    When we weren’t working, we were using social communication applications such as House Party which, apart from allowing you to stream music and play virtual DJ, enabled you to play games with one another.

    They were mostly silly general knowledge games but hangman made a welcome comeback to society thanks to this app.

    Discord, an American Voice over Internet Protocol (VoIP) that uses instant messaging and runs a digital distribution platform also gained new users. It no longer just relies on gamers and people in creative computer development roles to drive its usage.

    The Home Office

    We started (forcibly) working from home and those who believe it made them more efficient and productive are considering carrying on with it in 2021.
    The working from home concept, therefore, changed from being something associated with putting in half the effort and lazy lie-ins.

    Companies at least in the developed world, have to offer the option of working from home. Like any viral pandemic, Coronavirus will still be around in 2021 as the vaccine could take a while to ‘take effect’. Working from home isn’t disappearing any time soon!

    To operate a home office though, you need to have an advanced enough computer system, the right anti-virus software, and other methods of securing your work. Companies became concerned that people were using their personal computers to log onto work servers and bringing problems along with that. It’s not just good enough to get a laptop to have a ‘home office’.

    We have also had to set up reliable phone systems for business. Landlines are becoming old-fashioned plus virtual phone systems that are simple to set up and use are becoming popular.

    Smart speakers are also becoming popular. You can use them to play music via Spotify or the radio but can also be used to create the right audio ambience for your meetings and remind you about important events, tasks, and meetings.

    It’s all about getting tech products and virtual assistants to make working easier. People also invested in better desks and other office accessories such as computer or mobile-phone-operated coffee machines. Yes, those do exist! Expect the internet of things (IoT) to play a bigger role in your life next year and beyond.

    Cybercrime on fleek

    Naturally, because we are all forced online, this is no better time for cyber-thugs. They have upped the ante with cleverer ways to dupe you out of your already diminishing funds. Here some of the highlights of 2020 when it comes to crime on the web according to cybersecurity provider ID Agent:

    A cyberattack is attempted every 39 seconds.
    -700 million people in 21 countries experienced some form of cybercrime.
    The damage related to cybercrime is projected to hit $6 trillion annually by 2021.
    -Ransomware attacks rose 148% in March 2020.
    -Cloud-based attacks rose 630% between January and April 2020.
    -Two in five SMBs have been the victim of a ransomware attack.
    -More than 80% of reported cyberattacks are phishing.
    -Phishing attempts have increased by more than 660% since March 1, 2020.
    -Organized crime gangs account for 55% of attacks.

    The rise of AMD

    Chipmaker AMD has had a stellar year as it has brought out some of the most advanced (yet affordable) computer chips ever built and has managed to outshine rival behemoth, Intel.

    Its share price on the Nasdaq bounced from $49.10 to about $95.92. The company has been a runaway success story, especially over the past five years. At the end of December 2015, AMD stock was a paltry $2.87, that’s 3242% growth in half a decade!

    Another contributing factor for the company’s success is that AMD’s Ryzen line of processors has been a huge hit since its release. They are used in some of the best mining CPUs money can buy.

    Mining is the process of acquiring Bitcoins and other Cryptocurrencies using special software together with your PC’s hashing power.

    Crypto makes a comeback!

    Cryptocurrencies Bitcoin and Ethereum experienced returns of more than 216% and 390% year-to-date respectively.
    The argument is that institutional investors including some of the world’s largest finance houses and banks are now backing the world’s most popular digital currency.

    This is despite the fact that most ‘9-5 people’ are not using Bitcoin to buy much on a daily basis – but this trend is changing.
    It is still purported to be a means for criminals and drug dealers to help avoid banking authorities from checking their transactions. Or maybe that is just an underground rumour (or FUD) created by the fearful banking system.

    But seriously, a few things are speculated to be behind the Crypto surge.
    The US Federal Reserve cut interest rates, loaned more than $1.5 trillion to banks and financial institutions. It also increased its purchases of US treasury securities to stabilize the economy when the pandemic struck.
    This response was very strong and helped to weaken the effects of a national lockdown on the largest economy in the world.

    These actions created a favourable ‘macro environment’ in which to invest in an asset that is perceived as very risky given its lack of use and lack of clarity around what it can be used for. The high returns compared to Gold, interest-bearing and other traditional assets have certainly got the major asset managers excited.


    The second trend that propelled cryptocurrencies was the above-mentioned expansion of digital life. This may have lead to more investors feeling comfortable using a digital wallet. From payment systems, storage, finance, to gaming, gambling and sports: There is now literally a crypto-based coin for anything under the sun! This digital transformation has even prompted global Central Banks to seriously consider a move away from paper money.

    The Future

    Our lives are progressively going digital. Many older people who had never used a computer to shop online before, did so for the first time in 2020. They also using messaging apps for the first time as well as streaming entertainment services such as Netflix, Hulu, Amazon Prime, and Disney Plus.

    To sum up, the year 2020 has been an abomination of a year. Who knows what 2021 will bring? Maybe (tech-driven) Tesla stock will keep on rallying after successfully listing on the S&P500. But maybe also because owner, Elon Musk kind of took an interest to Bitcoin. This year has indefinitely made us aware of two things: proper sanitization and the practical use of computers.

  • Banking on Crypto

    Banking on Crypto

    The world is slowly realizing that it needs to rely less on old systems in order to manage its way out of financial crises. One of the oldest systems which saw the US dollar as the vehicular currency of the world may be slowly coming to an end.

    Enter the Bitcoin: the brainchild of cryptocurrency, a means of exchange that is less regulated and which is built on the Blockchain, a technology that is supposedly difficult to hack into.

    A quick recap for those of you not familiar with the tech: A Bitcoin is a computer file that can be stored in a ‘digital wallet’ app on your smartphone or computer. With this technology, every single transaction you make is recorded in a public list or publicly distributed ledger.

    This makes it easier for authorities to track and record your transactions but not you personally. We will not, however, get into the potential abuse of such anonymity in this article.

    Adoption

    We have been very slow to adopt new financial technologies for two reasons. First, there are many regulations that help maintain the US dollar as the vehicular currency, used by central banks and other financial institutions to secure assets. Second, many developers of the technology are hesitant to throw it upon us – yet.

    But this will change as the robustness and reliability of cryptocurrencies is proved study by study and case by case. One method is by using cryptology.

    Cryptology is used to protect your information from hackers. In fact, the protection of your data is more important than ever before. We have made our lives more public thanks to social media.

    While you may not mind so much if hackers get unauthorized access to your pictures and social media profiles, some information is actually valuable. This includes your banking details, birth certificate, licenses, and intellectual property.

    The Covid-19 pandemic has forced us all to work from home. Those employees of numerous companies are accessing commercial information using personal computers instead of office computers. But personal computers might lack anti-virus software, firewalls, and other security measures.

    Right now, cybercrime is costing companies at least $45bn a year worldwide.

    This is why now is cryptology’s time to shine. It will also be used to protect your online purchases made using cryptocurrencies instead of traditional money. It will help ensure that funds go from your bank account to a retailer’s quickly but securely.

    Using Crypto for daily activities

    Digital Cash

    Let’s face it, we are going to use Blockchain for shopping: Lamborghini already accepts purchases in Bitcoin. The concept might still be difficult for you to grasp, but they are still being developed and soon it will be near impossible to live without them.

    Read more about Distributed Applications ‘DApps’ here

    Gaming companies are already embracing cryptocurrencies. Fortnite, a popular online game, with more than 250-million players, allows you to buy in-game products using cryptocurrencies.

    Beyond regular shopping, you could soon buy a house using a cryptocurrency. Blockchain technology and the underlying distributed ledger technology is being used to increase transparency in real estate transactions using smart contracts.

    To reiterate the use case for Crypto, many countries like Germany are relaxing laws and giving licenses to allow ‘Crypto Banks’ to operate. This is one effort to ensure that your Cryptos are properly taxed when used for investment purposes.

    One such bank, Bitwala, allows you to purchase Bitcoins or Etheruem securely and quickly from a charges-free bank account which they provide.

    Your transactions are then documented so that you can seamlessly submit reports of the purchases to the local tax authorities (Finazamt) to avoid penalties. You can do this all directly from the Bitwala App.

    The blockchain and cryptocurrency are even being explored on national levels: China is allegedly creating its own national digital currency.

    The way forward

    Monetary systems will continue to be tested every day. Banks the world over are spending big bucks to protect themselves from hacks. But one day, a hacker could throw them into turmoil.

    When that happens, you might be unable to withdraw your money. A central bank’s database could be hacked making it difficult for it to work with other banks. In the meantime, alternatives to classic monetary systems need to be developed.

    Cryptocurrencies backed by cryptology could be a very strong alternative. There are also some valid cases for using Bitcoin as a global currency. This, however, will only become a reality if it shakes off its high trading volatility to become more stable.

    We live in a world where we need to be cognisant of our health and how viruses can spread easily and quickly like wildfire. It equally is imperative to realize that cyber attackers could get and infect our data just as swiftly. Using modern technologies can help prevent these intruders from creating a ‘digital security collapse’ pandemic.

  • The Online Threats of 2019

    The Online Threats of 2019

    How you can stop them from happening.

    Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking.

    To make matters worse, hackers continue to come up with some pretty creative ways to profit from stolen information.

    Without wasting time, these are the things you should already be doing to avoid being exposed to hackers in the first place:

    In order to keep these cyber-criminals out of your lives and computers, let’s take a look at some of the actual schemes to watch out for in 2019.

    Hacking

    We all know what hacking is by now – the term has almost become synonymous with internet security. So a question is: do you love watching movies on Netflix or jamming out to your summer playlist on Spotify? If the answer is yes, then you’re at a pretty high risk of getting hacked.

    DynaRisk, a UK cybersecurity firm, recently found that cybercriminals most commonly target these brands, along with adult-oriented sites (you know what we mean) and then, online gaming services.

    Identity Theft

    A few weeks ago, authorities caught a New York-based gang who had used identity theft to steal over $19 million worth of iPhones. Quartz reported that this operation ran for seven years.

    So-called “Top Dogs,” the ring leaders, would organize lower level members of their organization to steal identities and create clone credit and identity cards. Then, affiliates fanned across the nation, signing up for mobile phone plans to acquire iPhones, which were later sold for a profit by the Top Dogs.

    Because phone payment plans take the shape of nominal fees over the course of several years, victims often wouldn’t notice the fraud until it was too late. Learn how another scheme dubbed sim port attack works in the diagram below:

    Ransomware

    Hacking can happen to anyone – including our favorite bands. In early June, a hacker managed to steal the minidisk archive of Thom Yorke, the lead singer of Radiohead. This included previously unreleased demos and audio material from around the time of “OK Computer,” the band’s 1997 worldwide hit album. The hacker then demanded $150,000 on the threat of releasing it.

    Holding files for ransom is so common nowadays that it even has its own name: “Ransomware.” Either pay over the ransom or lose your files—or, even worse, have them released onto the unforgiving Internet.

    In response, Radiohead released all 18 hours of material on Bandcamp themselves, winning against these ransom hackers.

    Most security experts recommend the same route as Radiohead—never pay the ransom, because there’s no guarantee you’ll recover files or prevent their release.

    Sextortion

    If you think ransomware is bad, there’s an entire subgroup of it aimed to profit off sexual shame. Cheekily named “Sextortion,” some hackers creatively upgraded the classic email phishing scam to scare victims into handing over Bitcoin.

    According to Fortune, hackers have already racked up over $900,000 with sextortion. In these phishing emails, the sender claims to have spied on you while you watched porn—and has webcam footage of the salacious deeds. The message then demands a Bitcoin ransom, or else face the social and professional consequences of this lewd video getting sent to all your contacts.

    To make the threat even more believable, the sender references a previous password tied to the user’s email account. According to Krebson Security, a sextortion phishing message might look a little like what’s written in the sidebox.

    In rare cases, the threats are real—and hackers get their hands on some sexually explicit photos. Recently, American actress Bella Thorne fell victim to sextortion. Last Saturday, she took a similar, albeit more risqué, route as Radiohead, opting to release her nude photographs on Twitter in order to take the power away from her hacker.

    Last thoughts

    So, what’s the best way to avoid your personal, or, business from costing thousands in virtual currency? Since most of these emails are fake, you can just avoid them with a spam filter. And you should probably buy a webcam cover…just to be safe. When it comes to general browsing- we suggest using a VPN.

    Read more about VPNs here

    There are now more secure anti-hacking tools that use the Blockchain and offer great protection, especially against identity theft. Have a look at our feature on Tokenisation.

    Most online services now like mobile banks, offer App-based 2-factor authentication. This should now be regarded as the minimum security for ANY online account or App.

    To avoid hacking or phishing scams in general, optimizing your cybersecurity and using online common sense will save you loads of time, trouble and money.

    Cybersecurity by Acunetix
  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.