The Internet is one of the most significant inventions of our time. But, at the same time, this unlimited access to information has also made us very vulnerable to the snares and tricks of cyber criminology, writes GRAHAM CROOCK, Director, IT Audit, Risk and BDO Cyber Lab.
The dangers of Virtual Private Networks (VPNs) and BitTorrent have been the impetus behind cyber-attacks perpetuated by cyber criminals on many unsuspecting users.
VPNs, which are virtual in nature, are networks created within other networks. These enable users to exchange data across shared or public networks, primarily owing to the fact that they run on the internet.
It is for this reason that the internet is the communications structure for VPNs — they can never be completely private as they abide in the context of the Internet, which makes them susceptible to cyber-attacks through hackers being able to identify the IP addresses of the equipment connected to the specific network targeted for an attack.
It is important to remember that any device which is capable of accessing the internet and connected to a network has an IP address.
Firewalls are among the initial forms of protecting and securing private networks. This comprises having the best possible firewall technology on either end of the network. However, what remains a constant predicament for a number of users is the cost implications associated with efficiently protecting private networks. Often, users are faced with a trade-off between cost and security.
The dynamics of fighting against cybercrime positions defenders — those defending themselves from the scourge of cybercriminal activity — at a disadvantage from a cost perspective.
Cybercriminals execute their attacks at almost zero cost. Tthese criminals share vast pieces of code by stringing them together to formulate their attack methodologies. The culminating effect is that it becomes very economical for hackers to launch their attacks, a stimulus in the rise of cybercriminal activity.
At the opposite end of the spectrum, defenders are required to invest extensive time and resources as well as equipment in protecting themselves from cyber-attacks.
In light of this, our research continues to delve even deeper into the complexities of cyber-attack practices and methodologies.
The information age has also been a vibrant force in the promotion of the immediate consumption of information. With the infinite supply of information and content at our fingertips, the internet has become an online supply of data through file sharing and downloading.
BitTorrent has emerged as the fast and economical way of downloading files from the internet. BitTorrent sites are maintained by other torrent users who download, upload and share files with other users to access these files, such as music and movies.
VPN servers are often used to download torrents as they anonymise the torrenting activity. This culminates in the internet service providers being unable to determine what users are downloading, even though they can conclude that there is downloading activity taking place.
The main misfortunes that emanate from torrenting is the introduction of malware, a prevalent tool used by cybercriminals to propagate cyber-attacks on unsuspecting users. This originates from the fact that the data files that exist on these site are untrusted, and therefore, hackers use this notion to embed viruses and Trojans.
Another significantly overlooked facet is that of copywriting and legal consequences stemming from downloading content which could be subject to copywriting laws.
Education and training must remain at the forefront of preparedness against cybercrime. This approach is the impulse which will spur the surge in awareness among users to employ the necessary precautions required to combat the scourge of cyber criminology. Education and training is the podium that will emphasise users to take full ownership of their engagement with the internet.
Information technology continues to surge, and thus our awareness and alertness to these changes and developments must stay abreast. Hackers have the capabilities to access information about individuals through VPNs which should instead be a solution for users in relation to anonymous torrenting.
Through education and training, the Internet can be safely navigated by taking the necessary precautions which will stifle the progress of hackers.
Win a Poster Heater with Gadget and Takealot.com
This winter Gadget and Takealot.com are giving away three Poster Heaters, which look like posters but become heaters when you plug them in.
Three Gadget readers will each win a unit, valued at R550 each. To enter, follow @GadgetZA and @Takealot on Twitter and tell us on the @GadgetZA account how many Watts the heater consumes.
What’s the big deal about these heaters? Many of us are struggling to keep the balance between soaring electricity costs and the need to keep warm this winter.
However, the recently launched Poster Heater by EasyHeat and distributed in South Africa by Takealot.com is not only one of the most cost effective electric heaters currently on the market, it is also easy to setup and use.
As the name indicates, it is a poster similar to one you would hang on a wall. But, plug it in and it turns into a 300 Watt heater. The Poster Heater isn’t designed to heat hallways or large rooms, but rather smaller ones like a bedroom or a baby’s nursery or a dressing room.
It uses radiant heating, which means that it heats up in a couple of minutes and the heat is directed at the objects or people around it, quickly taking the chill out of the air and providing a comfortable ambient temperature.
The other advantage of radiant heating is that it doesn’t dry out the air like infrared or gas heaters. Users also don’t have to worry about their children or pets getting too close to it because, even though it gets hot, it can be touched.
To enter the competition follow the steps below:
Competition entry details:
3. The competition closes on 31 July 2018.
4. Winners will be notified via Twitter on 1 August and Takealot.com will be in touch to organise delivery.
5. The competition is only open to South African residents.
Happy Emoji Day! Here’s 10 reasons to be cheerful
First created by Shigetaka Kurita in 1999, the emoji has become a huge part of everyday communication. Whether you love them or hate them, flying dollar bills, applauding hands and rolling eyes are here to stay.
Scientist suggest that the use of emojis will help us gain the same satisfaction from digital interactions as we enjoy from personal contact.
Almost two decades later, and we have over 2600 unique emojis to perfectly express what we feel, thank you Mr Kurita! Join HMD, the home of Nokia phones as we celebrate World Emoji Day on the 17th of July with these interesting emoji facts:
The most popular emoji used is “Person Shrugging”
1. The Nokia 3310 was chosen as one of the first 3 “National” emojis for Finland… it represents unbreakable!
2. South Africa’s favourite emoji is the “Kiss and wink”… how sweet SA!
3. French is the only language where a ‘smiley’ does not top the list for its use
4. On average, over 60 billion emojis are sent on Facebook every day
5. For the first time ever, the Oxford Dictionaries Word of the Year was a pictograph! The “Face with Tears of Joy” was crowned word of the year in 2015
6. According to Emojipedia, some of the most requested emoji’s include afro, a bagel and hands making a heart
7. To include all races, a diversity pack was released in 2017
8. It has become so trendy that the Museum of Modern Art displays the original emoji collection on canvas
9. In 2009, Herman Melville’s classic Moby Dick was completely translated into emoji’s