News

Ignore cybersecurity at your peril

African National Congress Secretary General Ace Magashule claimed that his Twitter account had been hacked after the rand-damaging and potentially catastrophic tweet referring to the Reserve Bank’s mandate was sent from his account last week.

Published

on

NICOLA MILTZ

Whether it’s true or not, there is a spike in cyber hacking globally, which experts say needs to be addressed.

“It has come to my attention that there is a fake tweet doing the rounds alleged to be from my account,” tweeted Magashule last week in a bid to calm the waters after his tweet caused the rand to nosedive.

The list of Twitter, cell phone, and other cyber hacking claims is endless, with many prominent politicians falling prey to hackers. Most recently, the cell phone of Benny Gantz, the leader of Israel’s election frontrunner Blue and White party, was allegedly attacked by Iranian state intelligence.

Elliot Black from the Israel Trade Office told the SA Jewish Report this week, “Any remotely accessible information is remotely accessible to the wrong people. It is every individual, company’s, and manager’s responsibility to secure remotely accessible information services and money.”

A visiting delegation of Israel’s top cybersecurity start-ups was in South Africa this week for the Israel Cyber Roadshow, bringing relevant cybersecurity solutions to the local market.

It is actually very easy to hack someone’s Twitter account or cell phone, say computer scientists.

“Your phone is a spy tool,” said visiting cyber expert Ronen Sasson of CommuniTake Technologies, which specialises in mobile security. His company has developed the IntactPhone, which he says is practically unhackable. However, “nothing is 100% safe”.

Sasson said phones are usually hacked in one of three ways: either by malware inserted remotely, by physical extraction of encrypted data, or by the interception of communication while in transit.

“Hackers can listen to your board meetings, record the meeting, and hack into photographs and tap valuable data. They can even hack a pacemaker and cause a heart attack,” said Sasson, who has come to South Africa to leverage his expertise in mobile phone cyber security. “It is a behind-the-scenes war and in most cases, is even more damaging [than that],” he said.

In an environment of so many malware attacks and data breaches, is it possible to hack-proof your mobile device?

Here are a few ways to secure your cell phone:

Keep your operating system up to date, experts say. Many hackers take advantage of vulnerabilities in out-of-date operating systems.

Install security software, and choose an antivirus from a reputable antivirus company. When you set a passcode, pick something that’s complex, yet easy to remember. Avoid birthdays, pets’ names, bank PINs, or part of your phone number.

Avoid easy unlocking methods. Don’t be tricked by fingerprint or facial recognition. Hackers can copy your fingerprints from drinking glasses or use photographs of you.

Don’t set your phone to unlock automatically when you’re at home, or when it’s near other smart devices. If someone breaks into your home or gets hold of your smart watch, your phone will be vulnerable.

Download applications (apps) only from a reputable seller or site, such as Apple’s App Store or Google Play. Be careful if you use an Android phone. Google allegedly doesn’t vet its apps as carefully as Apple does.

Know how to control your phone remotely. Settings or apps allow you to remotely lock and erase your phone if it’s stolen. If you have an older iPhone, get the Find My iPhone app from iTunes. Download Find My Phone for older Android models.

Be careful when using unsecured Wi-Fi connections. Try to avoid them, and use your phone’s secure mobile connection. Otherwise, install a virtual private network, which directs your traffic through encrypted connections.

Disable Wi-Fi, Bluetooth, and cellular data when not in use. A hacker can’t hack your phone if it’s not connected to the internet.

Make sure to charge your smartphone on trusted USB ports. These include the ports on your computer and in your car (if applicable). Hackers can hack public USB charging ports like the ones you may see in a coffee shop or airport, and steal personal information.

Avoid auto-login because it makes hacking as easy as opening your browser. Take time to enter your usernames and passwords, especially on sites that you use for banking and other sensitive business.

Try to use a variety of passwords. Having the same password for your email, bank account, and social media apps makes a hacker’s job too easy. It’s recommended to use password management software to store login information.

Change passwords regularly. Don’t share personal information like addresses on social media.

Don’t open suspicious mails. Merely clicking on the link can give the sender a backdoor into your personal information. Delete the message immediately if you don’t recognise the sender.

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending

Exit mobile version