Stay Safe! Today the biggest challenge for you is to remain updated with recent technology and still protect yourself from the increasing cyber threat. Here are the real stories, these stories will make you reconsider your opinion of online protection.
As many as 11,592 cases of cybercrime were reported across India in 2015, nearly 26 times more than a decade ago, when 453 cases were reported in 2006 , according to data released by the National Crime Records Bureau.
Online Games: Blue Whale Challenge has become life threatening game
A threat that many kids fall for, especially teenagers, are those coming through chat rooms. Anonymous chat rooms are popular among teenagers to make new friends, and talk to different kinds of people. However, this modern twist to pen-pals comes with grave risks. Bullies hide behind the anonymity clause of websites to often target kids, either to make sexual and lewd comments or even send inappropriate content without their knowledge.
Blue Whale Challenge and other viral challenges like the Choking Game and the Cinnamon Challenge, are not the only forms of cyber threats out there. Cyber bullying can range from just a rude comment on a social media posts to outright trolling and harassment.
SAVE YOURSELF AND YOUR CHILD FROM SUCH ONLINE ACTIVITIES: How to save yourself from such attacks?
Ransomeware attack locked Reena’s mother laptop
Two days before Thanksgiving, Reena’s mother got hit by a ransomware attack. 5,726 files got locked by CryptoWall, an encryption malware so powerful it is technologically impossible to break open.
Reena’s mom contacted the attacker through the ransomware’s communication feature and told her she can either pay to get her files back or lose them forever. Despite backing up her files 6 months ago, she decided that losing half a year’s worth of photos, documents and other files was too much, and so decided to pay the ransom.
The price to unlock her files was 500$ in the first week and 1000$ in the second one, after which the files would be deleted. Payment was to be done in Bitcoin, an obscure and unfamiliar process which she had to learn on the fly.
Because of a major snowstorm that closed down the banks, Reena’s mom couldn’t pay the ransom in the first week, and ended up having to plead with her attacker to not increase the price to 1,000$. Surprisingly, he accepted and gave her the key to unlock her files.
LEARN MORE ABOUT RANSOMWARE AND GET PROTECTED AGAINST THIS THREAT: What is Ransomeware and how to save yourself from such attacks?
One in five business hit by Ransomeware are forced to close
The impact of ransomware was underlined by a study that one in 5 business hit by ransomware are forced to close. Despite this harsh reality, another study found that almost two-thirds of US office workers were unaware of ransomware threat, emphasising the need for cyber security awareness training.
LEARN MORE ABOUT RANSOMWARE AND GET PROTECTED AGAINST THIS THREAT: What is Ransomeware and how to save yourself from such attacks
Tom was blackmailed using his hacked account at Ashley Madison
Sometimes it’s not your fault. The websites you use get hacked and your information is exposed. Your instinct will be to say: “but I don’t have anything to hide!” Well, that’s not exactly true, is it?
Tom started using AshleyMadison several years prior to it being hacked in 2015, as a way to cope with a strained and difficult marriage. The secret liaisons he formed on the website helped alleviate many of the tensions and stresses between him and his wife, to the point where the couple started to become functional again.
After the hack, cybercriminals contacted him and demanded 500$ to remove his name from a publicly searchable registry and not send an email of his AM affairs to his family.
Tom refused, believing that if he paid them, they would know that he had something to lose and could be blackmailed further.
In the end, Tom had to live knowing his affairs on AM could be exposed at any time by the hackers, people who took it up upon themselves to impart justice on people in circumstances they couldn’t, or wouldn’t, understand.
LEARN MORE ABOUT HOW TO SAVE YOURSELF FROM SUCH IDENTITY THEFTS: Free Certificate training for Online Protection
412 million user accounts exposed in FriendFinder Networks hack
User details of more than 412 million accounts were exposed in a data breach at FriendFinder Networks, that once again confirmed poor user data protection and poor password practices.
Some other breaches, including the Dailymotion breach, which prompted calls for password alternatives.
LEARN MORE ABOUT HOW TO SET PASSWORDS: Best Practices for choosing Password
Just one of many phishing examples, but this happened to a seasoned Internet user
Ananda is more than your regular Internet user. She works for a big review website and has read plenty of cautionary stories about cyber security incidents. She knows and follows some basic steps that can shield her from cyber attacks, but she still fell for one of the most common scams out there: a phishing email.
After clicking a rogue link in a phishing email, cyber criminals managed to get hold of her account details. They called her bank and managed to extract £240 before her card was frozen. A nasty experience, especially since Amanda knew something was wrong the second she clicked the link, but by then it was just too late.
LEARN MORE ABOUT HOW TO IDENTIFY A PHISHING EMAIL: What is Phishing and How to save yourself?
When customer support falls prey to a social engineering hack
What happens when costumer support gives away your information? This Amazon user’s tale is an insightful one.
An impersonator once found out some of Eric’s fake information he used to register a website by looking into a public WHOIS registry for website owners.
The impersonator then used Eric’s fake information in a conversation with an Amazon customer support representative and found out his real address and phone number. Using Eric’s real information, the impersonator got in touch with various services and even managed to issue a new credit card on Eric’s name.
Eric got wind of his impersonator’s efforts by reading the customer support transcripts, and also found out his real purpose: to get the last 4 digits of his credit card.
Amazon didn’t do anything to protect Eric’s account, even though he repeatedly signaled the problem, so he finally decides to switch from Amazon to Google. As a parting note, he gets an email from Amazon implying they have provided the impersonator with the last 4 digits of his credit card.
This story about this guy’s tumultuous experience with Amazon will make you think twice about storing confidential information in your online accounts. The fact that Amazon failed to protect his account and look into the matter shows how a lack of cyber security education can endanger users.
LEARN MORE ABOUT HOW Human Psychology is exploited with Social Engineering: What is Social Engineering and How to save yourself?
Besides compromising your own data, cyber criminals can go on to scam your friends and family, host compromising files on your computer and dig a big hole in your account. They hacked Mark Zuckerberg’s Facebook account, so what makes you think that yours is safe?
Free Cyber Awareness Security Training with Eckovation
Eckovation has taken an initiative to spread the word of ONLINE PROTECTION with its free CERTIFICATION training on Cyber Awareness Security. Join this free initiative : http://www.eckovation.com/join/100100
Learn to Stay Safe Online! 🙂
This post has already been read 10787 times!