Hunting in the Cyberspace has been saved
Perspectives
Hunting in the Cyberspace
Part 1
Cyber Theft
Online payment systems may not guarantee the safety of your money – $81M stolen from central bank of Bangladesh in 2016 cyber heist
Drugs, information and your credit card data – Take your pick in the online black markets
Identity Theft
Is your child’s identity at risk? – Young mum experiences ‘digital kidnapping’
Cyber Bullying
Cyber bullying can kill - How it can lead to suicide
Ransomware
Your data and devices could be held hostage – Find out the anatomy of a ransomware
How is your data retrieved?
Social Engineering Attacks
Baiting – Watch what happens when you plug a foreign device into your computer
Phishing – Personal details targeted in phishing emails that appears as Google Docs
Pretexting – Your board director can be an impersonator to get your phone records (Hewlett-Packard incident)
Read more on social engineering fraud
Oversharing
Social media alone can help cyber criminals know you better– 30% of internet users vulnerable to attacks
Google tracks you by what you share – Here’s how to stop it
Think before you post – When it can cost you your job
What can you do?
Be discreet about your privacy settings and ‘check-in’s.
Be sure you know who people are before accepting connections
Be wary about messages from unfamiliar emails
References
BBC. (2010, August 25). Secret US military computers 'cyber attacked' in 2008. Retrieved from BBC: http://www.bbc.com/news/world-us-canada-11088658
BBC. (2013, January 31). New York Times 'hit by hackers from China'. Retrieved from BBC: http://www.bbc.com/news/world-asia-china-21271849
Broad, W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved from The New York Times: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html
CNET. (2017, May 15). WannaCry ransomware: Everything you need to know. Retrieved from CNET: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/
Fiegerman, S. (2016, December 15). Yahoo says data stolen from 1 billion accounts. Retrieved from CNN: http://money.cnn.com/2016/12/14/technology/yahoo-breach-billion-users/index.html?iid=EL
Jones, S. (2014, August 29). Ukraine: Russia’s new art of war. Retrieved from Financial Times: https://www.ft.com/content/ea5e82fa-2e0c-11e4-b760-00144feabdc0
Lee, T. B. (2013, November 1). How a grad student trying to build the first botnet brought the Internet to its knees. Retrieved from Washington Post: https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/?utm_term=.7cf9a699c497
Russell, A. (2004, February 28). CIA plot led to huge blast in Siberian gas pipeline. Retrieved from Telegraph: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1455559/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html
Telegraph. (2013, January 14). Red October computer virus found. Retrieved from Telegraph: http://www.telegraph.co.uk/technology/news/9800946/Red-October-computer-virus-found.html