Wednesday, January 28, 2015

Everything you need to know about cybercrime

The digital world entails exactly the same risks as the real world. The same. Neither more nor less. The problem is that rules are different while our nature and education is not yet ready to face it. Hence you can notice a scam on the street but you can be tricked by a malicious email. Therefore just one mistake is needed to finally "break down" your digital identity.

The best example of it are social media profiles, a juicy target for cybercrime. While criminal minds would have it far more difficult in real life, to impersonate anyone online is relatively affordable. You only need to obtain some access credentials. How? Tricking the victim, as it seems that happened to Taylor Swift on both Twitter and Instagram a few hours ago.

Nevertheless this is something as usual as the emergence of vulnerabilities. In this case, an exploit called GHOST allows an attacker to remotely access a Linux computer with no prior authentication, which is something like getting into a house without the keys because its owner left the door open.

What about mobile devices? They democratized communication, transforming our society forever. A new vulnerability on WiFi Direct allows third parties to conduct denial-of-service attacks on several Android devices (Nexus 4, Nexus 5, LG D806, Samsung SM-T310 and Motorola RAZR HD). Such bug forces the device to reboot. As a result you will be silenced, unable to express yourself, forced against your will. In fact, this may go unnoticed in the digital world, but it will certainly attract attention on the middle of the street.

But… Is it possible to stop attackers? Yes, it is. By raising cybercrime costs due to international pressure, increasing support between countries, teaching digital ethics, offering job opportunities to those with sufficient knowledge...

In real world, most people respect the rules. In an accident, everyone knows that the best thing they can do is to follow security instructions and emergency guidelines. Why is notthe same in the digital world? It is essential to practice preventive and proactive security in order to anticipate events and minimize risk.

However you would never leave your suitcase on the middle of an airport, right? Why don’t you do it with your files then? INCIBE shares a report on the current situation of two of the most used cloud storage services in terms of security. As a conclusion, Dropbox and Mega are as secure as the user makes them.

In the end, digital security is based on the same principles inherited from the animal instinct. They are still here, even if you do not pay them much attention.


Post a Comment