Skip to main content

‘I can intercept all your data’

‘I can intercept all your data’

With so much information stored in our smartphone, hackers have the luxury to intercept and get away with valuable data. We could also be leaving digital trail for hackers to take advantage. Data breaches is of everyone's concern, but are we doing enough to protect our personal information from hackers and cyber-criminals?


Data breaches and online security violations are very much a 21st-century problem. Survey found that one in five businesses had been attacked by cyber-criminals in the past year.

While we could be blamed for not taking simple steps – such as setting a strong password. Many think that security is going to be complicated, but it does not need to be.


The following is an article titled: Confession of a hacker: "I can intercept all your data"
Hopefully, it will help us understand the seriousness of cyber - hacking.

Have you ever wanted to know how online criminals gain access to your computer? 
Here, three ethical ‘white hat’ hackers reveal the dirty tricks of the trade to help you stay one step ahead.

“Most people see hackers in the wrong way,” says Alex Rice, chief technology officer, and co-founder of HackerOne. “They see them as attackers – so they have a checklist of defences they put up and think they’re no longer vulnerable. You should think of hackers as the kind of people who apply creativity to solving challenging problems.”

Rice works with blue-chip companies and the US Department of Defense to offer “bug bounties” – financial rewards for hackers who point out vulnerabilities (known as “white hat” hackers) rather than exploit them. “You have 20 different hackers, you’ll have 20 different solutions to a problem,” he says. “If there are 20 hackers on your side testing your defences, you’re much better prepared – understanding how hackers think is the key to defending against them.”

White hat hacker Jamie Woodruff has, for example: dressed up as a pizza boy to sneak into an office and access its network; found the dating-site profile of a powerful CEO’s daughter and picked her up for a date to lift her dad’s laptop; and scattered virus-ridden USB sticks marked “Spring Break 2016” around conferences.

Coffee shops, for Woodruff, are a goldmine. He uses a device that pretends to be a coffee shop’s genuine wifi router – it can be bought online for about £50. “Your phones are always looking for the networks that you’ve previously used, so this tricks them and I can intercept all your data,” he explains.

Most of us, of course, are unlikely to draw that level of specific attention – known as spear phishing – from a hacker. It’s typically senior company executives who are given the full, personalised services of a hacker – or even a team. Spear phishing, explains Rice, can involve scouring the target’s social media feeds to find when they’re going on holiday and then sending fake emails to their subordinates, instructing phoney invoice payments.

For most of us, a more general, scattershot level of hacking known as phishing is the most common thing we’re likely to encounter. In the UK alone, internet-enabled fraud cost Britons more than £280m a year, according to government-backed research, with the average victim losing £738. “There are skilled artist hackers and then there are criminals who are hacking,” explains David Emm, white hat hacker and principal security researcher at Kaspersky Labs. “They want a result with the minimum risk and effort possible.”

A good analogy, Emm explains, can be found on the plains of Africa. Predators watch herds of wildebeest for hours, looking for the injured or the slow. Those that are easy to attack. “Hackers are looking for loopholes – and they are doing it in bulk because some very simple scams are surprisingly effective when they reach a weaker target,” he explains. “They’ll target known vulnerabilities in common operating systems or code. A lot of us find the constant requests to update software annoying, so we switch it off. Many people are still using Windows XP, which has huge vulnerabilities and is no longer updated, that’s like going out in winter with no clothes on.”

Hackers find nothing easier than leaving malicious bits of code in online ads, that can jump on to any computer running out-of-date code, for instance, or sending out mass emails with links to fake banking sites, or infecting sites with ransomware, that can leap on to the unprotected computer and lock it down completely – demanding a small ransom for the password.

“The thing is active not passive defence,” adds Rice. “If you actively expect that a hacker will try for your bank details, you’ll be ready. You’ll update your software. You won’t click on links in emails – you’ll phone your bank to check. Be careful using public wifi. It’s not quite a jungle out there, but it’s smart to be careful.”


This article is an excerpt from The Guardian / Author not mentioned

Comments

Popular posts from this blog

CERTAINTY

Certainty - LIFE IN REVIEW Now, these are not goals or desires, these are universal. Everyone needs certainty that they can avoid pain and at least be comfortable. How do you get it? Control everybody? Develop a skill? Give up? Smoke a cigarette? And if you got totally certain, ironically, even though we all need that, like if you're not certain about your health, or your children, or money, you don't think about much. You're not sure if the ceiling's going to hold up, you're not going to listen to any motivational speaker. But, while we all go for certainty differently, if we get total certainty, we get what? What do you feel if you're certain? You know -       what's going to happen -       when it's going to happen -       how it's going to happen What would you feel? Bored out of your minds, So, God gave us a second human need, which is uncertainty . We need var...

ARE VIRTUAL CURRENCIES MONEY?

ARE VIRTUAL CURRENCIES MONEY? Cryptocurrencies or virtual currencies (VCs) experience high attention, because they allow their users to transfer money to other participants without a third party, without exchange rates, and even without stating their real name. Only a small processing fee has to be paid and the transaction is executed within minutes or hours (depending on several factors), even if the transaction happens between people located across the globe. Cryptocurrencies such as Bitcoin and altcoins have rapidly gained popularity, and are often quoted as a glimpse into our future. Virtual currencies (VCs) are digital representations of value, issued by private developers and denominated in their own unit of account. The VC ecosystem continues to transform with concepts of “currencies,” ranging from simple IOUs of issuers, VCs backed by assets such as gold, and “cryptocurrencies” such as Bitcoin. Assets like gold are backed by the combination of existing tangib...

What Makes a Master Teacher

What Makes a Master Teacher By George Couros   georgecouros@gmail.com When I think of a master teacher, here are the qualities that I would suggest they have: 1. Connects with kids first  -For all students to excel, teachers must learn about them and connect with each child.  This is not just about finding out how they learn, but it is finding out who they are.  It is essential that we get to know our students, learn their passions, and help them find out how we can engage them in their own learning.  If you are not able to do this as a teacher, the following characteristics will be moot, 2. Teaches kids first and curriculum second – Teachers must ensure that they differentiate learning and work to meet the needs of each student and understand how they each learn.  I believe that students have different learning styles and if we can best figure out how to help them meet their own needs, students will excel in the subject areas we t...