Perspectives

Hunting in the Cyberspace

 Part 1

Cyber Theft

Online payment systems may not guarantee the safety of your money – $81M stolen from central bank of Bangladesh in 2016 cyber heist

Drugs, information and your credit card data – Take your pick in the online black markets
 

Identity Theft

Is your child’s identity at risk? – Young mum experiences ‘digital kidnapping’
 

Cyber Bullying

Cyber bullying can kill - How it can lead to suicide
 

Ransomware

Your data and devices could be held hostage – Find out the anatomy of a ransomware
 

How is your data retrieved?

Social Engineering Attacks

Baiting – Watch what happens when you plug a foreign device into your computer

Phishing – Personal details targeted in phishing emails that appears as Google Docs

Pretexting – Your board director can be an impersonator to get your phone records (Hewlett-Packard incident)

Read more on social engineering fraud


Oversharing

Social media alone can help cyber criminals know you better– 30% of internet users vulnerable to attacks

Google tracks you by what you share – Here’s how to stop it

Think before you post – When it can cost you your job
 

What can you do?

Be discreet about your privacy settings and ‘check-in’s.

Be sure you know who people are before accepting connections

Be wary about messages from unfamiliar emails

May 2017 Part 1: Hunting in the Cyberspace

Your biggest risk could be you

References

BBC. (2010, August 25). Secret US military computers 'cyber attacked' in 2008. Retrieved from BBC: http://www.bbc.com/news/world-us-canada-11088658

BBC. (2013, January 31). New York Times 'hit by hackers from China'. Retrieved from BBC: http://www.bbc.com/news/world-asia-china-21271849

Broad, W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved from The New York Times: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html

CNET. (2017, May 15). WannaCry ransomware: Everything you need to know. Retrieved from CNET: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/

Fiegerman, S. (2016, December 15). Yahoo says data stolen from 1 billion accounts. Retrieved from CNN: http://money.cnn.com/2016/12/14/technology/yahoo-breach-billion-users/index.html?iid=EL

Jones, S. (2014, August 29). Ukraine: Russia’s new art of war. Retrieved from Financial Times: https://www.ft.com/content/ea5e82fa-2e0c-11e4-b760-00144feabdc0

Lee, T. B. (2013, November 1). How a grad student trying to build the first botnet brought the Internet to its knees. Retrieved from Washington Post: https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/?utm_term=.7cf9a699c497

Russell, A. (2004, February 28). CIA plot led to huge blast in Siberian gas pipeline. Retrieved from Telegraph: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1455559/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html

Telegraph. (2013, January 14). Red October computer virus found. Retrieved from Telegraph: http://www.telegraph.co.uk/technology/news/9800946/Red-October-computer-virus-found.html

Did you find this useful?