Connect with us

Featured

VPNs vs Torrents: how enterprise can take on challenge

Published

on

The Internet is one of the most significant inventions of our time. But, at the same time, this unlimited access to information has also made us very vulnerable to the snares and tricks of cyber criminology, writes GRAHAM CROOCK, Director, IT Audit, Risk and BDO Cyber Lab.

The dangers of Virtual Private Networks (VPNs) and BitTorrent have been the impetus behind cyber-attacks perpetuated by cyber criminals on many unsuspecting users.

VPNs, which are virtual in nature, are networks created within other networks. These enable users to exchange data across shared or public networks, primarily owing to the fact that they run on the internet.

It is for this reason that the internet is the communications structure for VPNs — they can never be completely private as they abide in the context of the Internet, which makes them susceptible to cyber-attacks through hackers being able to identify the IP addresses of the equipment connected to the specific network targeted for an attack.

It is important to remember that any device which is capable of accessing the internet and connected to a network has an IP address.

Firewalls are among the initial forms of protecting and securing private networks. This comprises having the best possible firewall technology on either end of the network. However, what remains a constant predicament for a number of users is the cost implications associated with efficiently protecting private networks.  Often, users are faced with a trade-off between cost and security.

The dynamics of fighting against cybercrime positions defenders — those defending themselves from the scourge of cybercriminal activity — at a disadvantage from a cost perspective.

Cybercriminals execute their attacks at almost zero cost. Tthese criminals share vast pieces of code by stringing them together to formulate their attack methodologies. The culminating effect is that it becomes very economical for hackers to launch their attacks, a stimulus in the rise of cybercriminal activity.

At the opposite end of the spectrum, defenders are required to invest extensive time and resources as well as equipment in protecting themselves from cyber-attacks.

In light of this, our research continues to delve even deeper into the complexities of cyber-attack practices and methodologies.

The information age has also been a vibrant force in the promotion of the immediate consumption of information. With the infinite supply of information and content at our fingertips, the internet has become an online supply of data through file sharing and downloading.

BitTorrent has emerged as the fast and economical way of downloading files from the internet. BitTorrent sites are maintained by other torrent users who download, upload and share files with other users to access these files, such as music and movies.

VPN servers are often used to download torrents as they anonymise the torrenting activity. This culminates in the internet service providers being unable to determine what users are downloading, even though they can conclude that there is downloading activity taking place.

The main misfortunes that emanate from torrenting is the introduction of malware, a prevalent tool used by cybercriminals to propagate cyber-attacks on unsuspecting users. This originates from the fact that the data files that exist on these site are untrusted, and therefore, hackers use this notion to embed viruses and Trojans.

Another significantly overlooked facet is that of copywriting and legal consequences stemming from downloading content which could be subject to copywriting laws.

Education and training must remain at the forefront of preparedness against cybercrime. This approach is the impulse which will spur the surge in awareness among users to employ the necessary precautions required to combat the scourge of cyber criminology. Education and training is the podium that will emphasise users to take full ownership of their engagement with the internet.

Information technology continues to surge, and thus our awareness and alertness to these changes and developments must stay abreast. Hackers have the capabilities to access information about individuals through VPNs which should instead be a solution for users in relation to anonymous torrenting.

Through education and training, the Internet can be safely navigated by taking the necessary precautions which will stifle the progress of hackers.

Featured

Money talks and electronic gaming evolves

Computer gaming has evolved dramatically in the last two years, as it follows the money, writes ARTHUR GOLDSTUCK in the second of a two-part series.

Published

on

The clue that gaming has become big business in South Africa was delivered by a non-gaming brand. When Comic Con, an American popular culture convention that has become a mecca for comics enthusiasts, was hosted in South Arica for the first time last month, it used gaming as the major drawcard. More than 45 000 people attended.

The event and its attendance was expected to be a major dampener for the annual rAge gaming expo, which took place just weeks later. Instead, rAge saw only a marginal fall in visitor numbers. No less than 34 000 people descended on the Ticketpro Dome for the chaos of cosplay, LAN gaming, virtual reality, board gaming and new video games. 

It proved not only that there was room for more than one major gaming event, but also that a massive market exists for the sector in South Africa. And with a large market, one also found numerous gaming niches that either emerged afresh or will keep going over the years. One of these, LAN (for Local Area Network) gaming, which sees hordes of players camping out at the venue for three days to play each other on elaborate computer rigs, was back as strong as ever at rAge.

MWeb provided an 8Gbps line to the expo, to connect all these gamers, and recorded 120TB in downloads and 15Tb in uploads – a total that would have used up the entire country’s bandwidth a few years ago.

“LANs are supposed to be a thing of the past, yet we buck the trend each year,” says Michael James, senior project manager and owner of rAge. “It is more of a spectacle than a simple LAN, so I can understand.”

New phenomena, often associated with the flavour of the moment, also emerge every year.

“Fortnite is a good example this year of how we evolve,” says James. “It’s a crazy huge phenomenon and nobody was servicing the demand from a tournament point of view. So rAge and Xbox created a casual LAN tournament that anyone could enter and win a prize. I think the top 10 people got something each round.”

Read on to see how esports is starting to make in impact in gaming.

Previous Page1 of 3

Continue Reading

Featured

AppDate: DStv jumps on music bandwagon

In this week’s AppDate, SEAN BACHER highlights DStv’s JOOX, Cisco’s Security Connector, Diski Skills, Namola and Exhibid.

Published

on

DStv JOOX

DStv is now offering JOOX, a music streaming service owned by China’s Tencent, to DStv Premium, Compact Plus and Compact customers.

In addition to streaming local and international artists, JOOX allows one to switch to karaoke mode and learn the lyrics as well as create and share playlists. Users can add up to four friends or family to the service free of charge.

DStv Family, Access and EasyView customers can also log in to the free JOOX service directly through JOOX App, but will be unable to add additional friends and won’t be able to listen to add-free music.

Platform: Access the JOOX service directly from the services menu on DStv or download the JOOX app for an iOS or Android phone.

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Cisco Security Connector

With all the malware, viruses and trojans doing the rounds, it is difficult for users and enterprises to ensure that they don’t become targets. Cisco, in collaboration with Apple, has brought out its Cisco Security Connector to protect users. The app is designed to give enterprises and users overall visibility and control over their network activity on iOS devices. It does this by ensuring compliance of mobile users and their enterprise-owned iOS devices during incident investigations, by identifying what happened, who it affected, and the risk of the exposure. It also protects iPhone and iPad users from accessing malicious sites on the Internet, whether on the corporate network, public Wi-Fi, or cellular networks. In turn, it prevents any viruses from entering a company’s network.

Platform: iPhones and iPads running iOS 11.3 or later

Expect to pay: A free download

Stockists: Visit the Apple App Store for downloading instructions.

 

Diski Skills

The Goethe-Institut, in co-operation with augmented reality specialists Something Else Design Agency, has created a new card game which celebrates South African freestyle football culture, and brings it alive through augmented reality. Diski Skills is quick card game, set in a South African street football scenario, showing popular tricks such as the Shibobo, Tsamaya or Scara Turn. Each trick is rated in categories of attack, defence and swag – one wins the game by challenging an opponent strategically with the trick at hand. Through augmented reality, the cards come alive. Move a smartphone over a card and watch as the trick appears on the screen in a slow motion video. An educational value is added as players can study the tricks and learn more about the idea behind it.

 

The game will be launched on 27 October 2018 at the Goethe-Institut.

For more information visit: www.goethe.de

 

Namola

With  recent news of kidnappings on the rise, a lot more thought is going into keeping children safe. Would your child know what to do in an emergency? Have you actually asked them?

Namola, supported by Dialdirect Insurance, is a free mobile safety app. Namola’s simple interface makes it an ideal way for children to learn how to get help in an emergency. All they need to do is activate the app and push a button to get help that they need, even when their parents are not around.

Parents need to install the app on their child’s phone, hold down the request assistance button, program emergency numbers that will automatically be dialled when the emergency button is pushed, and teach their children how and when to use the app.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Exhibid

Exhibid could be thought of as Tinder, but for for art lovers. The interface looks very similar to the popular mobile dating app, in that users swipe left for a painting that doesn’t appeal to them, or swipe right for something they like. Once an art piece is liked by swiping right, one can start bidding or make an offer on it. The bid is automatically sent to the artist. Should he or she accept the offer, the buyer makes a payment through the app’s secure payment gateway and the two are put in contact to make arrangements for delivery.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

Continue Reading

Trending

Copyright © 2018 World Wide Worx