Skip to main content

‘I can intercept all your data’

‘I can intercept all your data’

With so much information stored in our smartphone, hackers have the luxury to intercept and get away with valuable data. We could also be leaving digital trail for hackers to take advantage. Data breaches is of everyone's concern, but are we doing enough to protect our personal information from hackers and cyber-criminals?


Data breaches and online security violations are very much a 21st-century problem. Survey found that one in five businesses had been attacked by cyber-criminals in the past year.

While we could be blamed for not taking simple steps – such as setting a strong password. Many think that security is going to be complicated, but it does not need to be.


The following is an article titled: Confession of a hacker: "I can intercept all your data"
Hopefully, it will help us understand the seriousness of cyber - hacking.

Have you ever wanted to know how online criminals gain access to your computer? 
Here, three ethical ‘white hat’ hackers reveal the dirty tricks of the trade to help you stay one step ahead.

“Most people see hackers in the wrong way,” says Alex Rice, chief technology officer, and co-founder of HackerOne. “They see them as attackers – so they have a checklist of defences they put up and think they’re no longer vulnerable. You should think of hackers as the kind of people who apply creativity to solving challenging problems.”

Rice works with blue-chip companies and the US Department of Defense to offer “bug bounties” – financial rewards for hackers who point out vulnerabilities (known as “white hat” hackers) rather than exploit them. “You have 20 different hackers, you’ll have 20 different solutions to a problem,” he says. “If there are 20 hackers on your side testing your defences, you’re much better prepared – understanding how hackers think is the key to defending against them.”

White hat hacker Jamie Woodruff has, for example: dressed up as a pizza boy to sneak into an office and access its network; found the dating-site profile of a powerful CEO’s daughter and picked her up for a date to lift her dad’s laptop; and scattered virus-ridden USB sticks marked “Spring Break 2016” around conferences.

Coffee shops, for Woodruff, are a goldmine. He uses a device that pretends to be a coffee shop’s genuine wifi router – it can be bought online for about £50. “Your phones are always looking for the networks that you’ve previously used, so this tricks them and I can intercept all your data,” he explains.

Most of us, of course, are unlikely to draw that level of specific attention – known as spear phishing – from a hacker. It’s typically senior company executives who are given the full, personalised services of a hacker – or even a team. Spear phishing, explains Rice, can involve scouring the target’s social media feeds to find when they’re going on holiday and then sending fake emails to their subordinates, instructing phoney invoice payments.

For most of us, a more general, scattershot level of hacking known as phishing is the most common thing we’re likely to encounter. In the UK alone, internet-enabled fraud cost Britons more than £280m a year, according to government-backed research, with the average victim losing £738. “There are skilled artist hackers and then there are criminals who are hacking,” explains David Emm, white hat hacker and principal security researcher at Kaspersky Labs. “They want a result with the minimum risk and effort possible.”

A good analogy, Emm explains, can be found on the plains of Africa. Predators watch herds of wildebeest for hours, looking for the injured or the slow. Those that are easy to attack. “Hackers are looking for loopholes – and they are doing it in bulk because some very simple scams are surprisingly effective when they reach a weaker target,” he explains. “They’ll target known vulnerabilities in common operating systems or code. A lot of us find the constant requests to update software annoying, so we switch it off. Many people are still using Windows XP, which has huge vulnerabilities and is no longer updated, that’s like going out in winter with no clothes on.”

Hackers find nothing easier than leaving malicious bits of code in online ads, that can jump on to any computer running out-of-date code, for instance, or sending out mass emails with links to fake banking sites, or infecting sites with ransomware, that can leap on to the unprotected computer and lock it down completely – demanding a small ransom for the password.

“The thing is active not passive defence,” adds Rice. “If you actively expect that a hacker will try for your bank details, you’ll be ready. You’ll update your software. You won’t click on links in emails – you’ll phone your bank to check. Be careful using public wifi. It’s not quite a jungle out there, but it’s smart to be careful.”


This article is an excerpt from The Guardian / Author not mentioned

Comments

Popular posts from this blog

7 DEADLY SINS OF SPEAKING

7 DEADLY SINS OF SPEAKING The human voice is a powerful sound. What I mean is that, what we say have the potential to start an argument or bring benefits to people. But sometimes our words turn people away because for some reason whether we realize it or not we tend to abuse words when we speak. Now let me just put this in context to close. This is a serious point here. We all know from experience that people that we are in contact with in our lives help shapes us.  And why is that? How can we speak powerfully to make changes for others to benefit? What I'd like to suggest, there are a number of habits that we need to avoid when we speak. So, here's the seven deadly sins of speaking which I think, are some of the habits that we all fall into very often in our daily conversation.  7 DEADLY SINS OF SPEAKING Gossip . Speaking ill of somebody who's not present is definitely not a good habit, and we know perfectly well the person gossiping will be gos...

8 THINGS TO LOOK FOR IN TODAY'S CLASSROOM

8 Things to Look For in Today’s Classroom By  George Couros   8 things that I really want to see in today’s classroom.   I really believe that classrooms need to be learner focused.  This is not simply that students are creating but that they are also having opportunities to follow their interests and explore passions.  The teacher should embody learning as well. Will Richardson recently write this in a comment on one of my recent posts on what teachers need to be like in our current day and the focus that needs to be on learning: …we need teachers who are masters at developing kids as learners who are adept at sense making around their own goals. Teachers who are focused on helping students develop the dispositions and literacies required to succeed regardless of subject or content or curriculum This moment is all about learners having an amazing new freedom to learn, not teachers having an amazing new freedom to...

ICO AND HOW TO SPOT A SCAM

   How to spot ICO scam. ICO stands for Initial Coin Offering. It’s an event, sometimes referred to as ‘crowdsale’, when a company releases its own cryptocurrency with a purpose of funding. It usually releases a certain number of crypto-tokens and then sells those tokens to its intended audience, most commonly in exchange for Bitcoins, but it can be fiat money as well. As a result, the company gets the capital to fund the product development and the audience members get their crypto tokens’ shares. Plus, they have complete ownership of these shares. The key goal for every ICO participant is to help fund a project that they personally consider interesting and appealing. However, there is an additional opportunity to make a profit in the process. In most cases, the crypto-tokens released during an ICO are sold at a fixed price denominated in Bitcoins or US dollars. That price isn’t backed by anything but the community’s faith in the development team to release a fi...