Hunting in the Cyberspace

 Part 1

Cyber Theft

Online payment systems may not guarantee the safety of your money – $81M stolen from central bank of Bangladesh in 2016 cyber heist

Drugs, information and your credit card data – Take your pick in the online black markets

Identity Theft

Is your child’s identity at risk? – Young mum experiences ‘digital kidnapping’

Cyber Bullying

Cyber bullying can kill - How it can lead to suicide


Your data and devices could be held hostage – Find out the anatomy of a ransomware

How is your data retrieved?

Social Engineering Attacks

Baiting – Watch what happens when you plug a foreign device into your computer

Phishing – Personal details targeted in phishing emails that appears as Google Docs

Pretexting – Your board director can be an impersonator to get your phone records (Hewlett-Packard incident)

Read more on social engineering fraud


Social media alone can help cyber criminals know you better– 30% of internet users vulnerable to attacks

Google tracks you by what you share – Here’s how to stop it

Think before you post – When it can cost you your job

What can you do?

Be discreet about your privacy settings and ‘check-in’s.

Be sure you know who people are before accepting connections

Be wary about messages from unfamiliar emails

May 2017 Part 1: Hunting in the Cyberspace

BBC. (2010, August 25). Secret US military computers 'cyber attacked' in 2008. Retrieved from BBC:

BBC. (2013, January 31). New York Times 'hit by hackers from China'. Retrieved from BBC:

Broad, W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved from The New York Times:

CNET. (2017, May 15). WannaCry ransomware: Everything you need to know. Retrieved from CNET:

Fiegerman, S. (2016, December 15). Yahoo says data stolen from 1 billion accounts. Retrieved from CNN:

Jones, S. (2014, August 29). Ukraine: Russia’s new art of war. Retrieved from Financial Times:

Lee, T. B. (2013, November 1). How a grad student trying to build the first botnet brought the Internet to its knees. Retrieved from Washington Post:

Russell, A. (2004, February 28). CIA plot led to huge blast in Siberian gas pipeline. Retrieved from Telegraph:

Telegraph. (2013, January 14). Red October computer virus found. Retrieved from Telegraph:

Did you find this useful?