Placeholder Content Image

Shocking twist to 12-year-old’s heroic fundraising effort

<p dir="ltr">A 12-year-old boy who raised over $400,000 (NZ 480,000) for those suffering in Ukraine has experienced a sudden shock - his social media accounts have been targeted by Russian hackers.</p> <p><span id="docs-internal-guid-3f4c4284-7fff-75e4-9f41-65f2826569a5"></span></p> <p dir="ltr">Gabriel Clark’s story started when his dad, TV and film director Richard Clark, posted to Twitter asking his followers to follow his son’s woodworking account on Instagram.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Lovely twitter people - I don't know how many of you are also <a href="https://twitter.com/hashtag/instagram?src=hash&amp;ref_src=twsrc%5Etfw">#instagram</a> users but I'm looking for a wee favour. I've a 12yr old who loves woodwork. He spends hours on his lathe making bowls and creating chopping boards which he's sells to save up for a mountain bike. 1/3 <a href="https://t.co/Ny60rFf1TE">pic.twitter.com/Ny60rFf1TE</a></p> <p>— Richard R Clark 🇺🇦 (@rclarkie) <a href="https://twitter.com/rclarkie/status/1507415791116857349?ref_src=twsrc%5Etfw">March 25, 2022</a></p></blockquote> <p dir="ltr">By the following day, Gabriel’s followers grew from just six to over 33,000 and he had received a whopping 20,000 orders for the bowls and chopping boards he makes using his lathe.</p> <p dir="ltr">“It was a lot to take in for a wee lad of 12yrs (sic),” his dad wrote in a Twitter thread recounting the situation.</p> <p dir="ltr">After calculating that it would take him 32 years to fulfil every order, Gabriel decided to make just one bowl, called ‘Gabriel’s Bowl for Ukraine’.</p> <p dir="ltr">“We set up a Just Giving page 10 days ago for Save the Children’s Ukraine Appeal, with Gabriel setting a target of £5,000,” Richard explained. “The fundraiser would stay live until Easter when one donor would be chosen at random to win his bowl.”</p> <p dir="ltr">Within 24 hours, donations exceeded £50,000 and by April 21, nearly 14,000 people had given a total of £251,661, with an entrant named Renuka Chapman winning the special prize.</p> <p dir="ltr"><span id="docs-internal-guid-38c7529e-7fff-cb3a-a323-dbcf793b8e71"></span></p> <p dir="ltr">But, Gabriel’s successes have been soured within just one week, with Mr Clark revealing that Russian hackers had taken down Gabriel’s Instagram account and they had lost all of his content.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Ok everyone. GABRIEL REALLY NEEDS YOUR HELP. Russian hackers have taken down his <a href="https://twitter.com/instagram?ref_src=twsrc%5Etfw">@instagram</a> account clarkie_woodwood. All posts and everything gone. We desperately need Instagram to contact us.<br />Please help &amp; RT! <a href="https://t.co/pWubH87cKQ">pic.twitter.com/pWubH87cKQ</a></p> <p>— Richard R Clark 🇺🇦 (@rclarkie) <a href="https://twitter.com/rclarkie/status/1519957679287975940?ref_src=twsrc%5Etfw">April 29, 2022</a></p></blockquote> <p dir="ltr">Appealing for online help once again, even Ben Wallace, the UK’s Defence Secretary, called on the country’s National Cyber Security Centre to lend a hand.</p> <p dir="ltr">“@NCSC (The National Cyber Security Centre’s Twitter account) let’s see what we can do to help. What a thing to do to Gabriel!” Mr Wallace wrote.</p> <p dir="ltr">As of publication, Mr Clark confirmed that his son’s account was “half back at least”, describing it as “one less stressful day.</p> <p dir="ltr"><span id="docs-internal-guid-e350c057-7fff-e19d-bd95-7018f8ecddd2"></span></p> <p dir="ltr"><em>Image: @rclarkie (Twitter)</em></p>

Caring

Placeholder Content Image

Woman scammed out of $730,000

<p dir="ltr">A woman has lost an eye-watering $730,000 after opening an email from who she thought was her settlement agent.</p> <p dir="ltr">The victim was in the process of purchasing a property in Western Australia and had clicked on the email which asked for money to be deposited into an account they were in control of.</p> <p dir="ltr">After filling out the “authentic-looking documents”, the scammers were able to take control of $730,000. </p> <p dir="ltr">Consumer Protection WA confirmed that the settlement agent’s email was hacked by the scammers in what is described as payment redirection scams.</p> <p dir="ltr">Payment redirection scams are almost impossible to tell the difference between the real and the fake thing. </p> <p dir="ltr">In this instance, the woman did not think twice that the email would have been a scam after the agent reminded her of the payment. </p> <p dir="ltr">Consumer Protection executive director Trish Blake said the hack is sophisticated and can make it difficult to know when the hacking took place.</p> <p dir="ltr">“These scams usually involve the hacking into someone’s email account or computer system but it can be difficult to determine exactly where the hack has occurred,” she told <a href="https://www.news.com.au/technology/online/hacking/woman-loses-730000-after-one-scam-email-while-buying-property/news-story/0eabd0fcc189dc3a0bd7c472f0034150" target="_blank" rel="noopener">news.com.au</a>.</p> <p dir="ltr">“The hackers may have successfully guessed the password or installed spyware or malware on computers or laptops after recipients open attachments or click on links in scam emails.</p> <p dir="ltr">“The losses from these scams can be extremely devastating to the victims who may have lost their home deposit that they have been saving for many years and may not be able to buy the home of their dreams. Or it may be a business doing it tough that can least afford to lose such a large amount of money.”</p> <p dir="ltr"><em>Image: Shutterstock</em></p>

Money & Banking

Placeholder Content Image

What hackers can do with just your phone number

<p><strong>Your number can be used in many malicious ways</strong></p> <p>Your phone number is an easy-to-find key that can be used by hackers and scammers to unlocking your personal data. They can also use your number in many other malicious ways.</p> <p>I used to think that maybe, at best, a person could possibly find my name and address using my phone number. I was wrong. Recently, someone I don’t know used my phone number to find out the private details of my life, then emailed me everything they had discovered.</p> <p>With just my phone number this person found out where I live, my previous addresses, information on if I’ve ever been evicted, some personal financial information, a map of my neighbourhood, and my birth date. They even found the only speeding ticket I’ve ever had, way back in 2006. It was disturbing, to say the least.</p> <p>I felt, and still feel, violated. I reported the person to the social media site they contacted me through and blocked them, but is there more I can do?</p> <p>After contacting some security experts for their take, it turns out that finding important details about someone’s life with just a phone number is incredibly alarmingly easy…and profitable.</p> <p>“In the wrong hands, your phone number can be used to steal your identity and take over almost every online account you have,” Veronica Miller, cybersecurity expert at VPN overview, tells Reader’s Digest.</p> <p>There are several ways a hacker can use a phone number to turn your life upside down. Here are some ways criminals can target you.</p> <p><strong>Data mining the easy way</strong></p> <p>The easiest way to use your phone number maliciously is by simply typing it into a people search site. Sites like these can reveal personal information about you in less than a few seconds, according to tech expert Burton Kelso.</p> <p>People search sites, purchase your personal information and then sell it to people who want your data, like hackers with your phone number.</p> <p>The information found through these sites includes your address, bankruptcies, criminal records and family member’s names and addresses. All of this can be used for blackmail, stalking, doxing or identity theft.</p> <p><strong>Rerouting your number</strong></p> <p>Another tactic is to contact your mobile carrier provider claiming to be you, said Miller. Then, the hacker can make it so your number routes to their phone. From there, the hacker will log into your email account. Of course, they don’t have your password, but they don’t need it.</p> <p>They just click “Forgot your password” and get the reset link sent to their phone that now uses your phone number. Once the hacker has access to your email account, it’s easy to gain access to any of your accounts.</p> <p>While many service providers have some security features to prevent scammers from switching phones, if the person has your phone number, though, they may be able to find enough information about you to get past the security questions.</p> <p><strong>Spoofing</strong></p> <p>There were billions of scam calls in 2019, according to data collected by YouMail, and scammers are getting smarter. Now they are using a technique called spoofing to make it easier to scam you. Spoofing is when someone makes your phone number pop up on a caller ID when it really isn’t you that’s making the call.</p> <p>For example, a scammer once spoofed my daughter’s phone number to make me think she was calling me. The goal was to trick me into answering the phone. It worked, because what if it was an emergency and my daughter needed me?</p> <p>When a scammer gets you to pick up, they have the chance to trick you into whatever scheme they’ve come up with, like tricking you into giving them your credit card information.</p> <p>It doesn’t take much to spoof a phone number. There are apps and websites that allow scammers to simply type in a phone number and make a call. It’s super easy and quick, which makes it appealing to scammers.</p> <p><strong>Texting scams</strong></p> <p>Scammers can also use your phone number to send you malicious text messages. This type of scam is called ‘smishing’, according to digital privacy expert Ray Wallsh.</p> <p>In these texts, scammers can send links that can infect your phone with malware that can steal your personal information, or they can straight-up scam you by pretending to be your bank, the IRS, or your doctor.</p> <p>Posing as someone you trust, the scammers will then try to trick you into giving them personal information and credit card numbers.</p> <p><strong>How to protect yourself</strong></p> <p>All of the experts I contacted recommended that to combat your phone number being misused, share it as little as possible. “Many apps and services require a cell number for verification at sign up. By handing your data to these apps, services and businesses, you increase the likelihood that your phone number will be passed on to third parties and data aggregators,” said Wallsh. Limit giving out your phone number to friends and family and your doctor.</p> <p>For everyone else, you need a virtual number that can forward calls to your phone so you don’t need to give anyone your real number that is linked to your personal information. You can set up a virtual number for free through Google Voice or through services like Burner.</p> <p>Also, never click on links sent to you in text messages, even if they look like they were sent from a trusted contact. If your bank, credit card company, doctor or service you use contacts you through text, call them using a verified number from their website to confirm the communication was truly sent from them to avoid malware or scams.</p> <p>To protect yourself from hackers rerouting your number, ask your mobile carrier to add an extra layer of security like a password or PIN number to your account, advises Miller.</p> <p>All of these steps can help keep your personal information private, but it only works to a point. Your personal data has probably already been sold to people search sites and while you can send these sites requests to remove your information, it’s a huge task. Plus, the site may simply repost your information later.</p> <p>So, in the end, there may not be a way to completely prevent hackers and scammers from getting access to your phone number. Knowing what someone can do with your number, though, can help you avoid scams and protect your information from being more widely spread.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a rel="noopener" href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/what-hackers-can-do-with-just-your-phone-number" target="_blank">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

Hackers are getting smarter by targeting councils and governments

<p>In recent weeks, <a href="https://www.zdnet.com/article/city-of-johannesburg-held-for-ransom-by-hacker-gang/">Johannesburg’s computer network was held for ransom</a> by a hacker group called Shadow Kill Hackers. This was the <a href="https://www.bbc.com/news/technology-49125853">second time</a> in three months a ransomware attack has hit South Africa’s largest city. This time, however, hackers didn’t pose the usual threat.</p> <p>Rather than denying the city <a href="https://www.hkcert.org/ransomware.hk/ransomware-basic.html">access to its data</a>, the standard blackmail in a ransomware attack, they threatened to publish it online. This style of attack, known as <a href="https://en.wikipedia.org/wiki/Ransomware#Leakware_(also_called_Doxware)">leakware</a>, allows hackers to target more victims in a single attack – in this case the city’s citizens.</p> <p>The latest Johannesburg attack was the second leakware attack of this type ever recorded, and a similar attack could hit Australia soon. And although our current cyberattack defences are more advanced than many countries, we could be taken by surprise because of the unique way leakware operates.</p> <p><strong>A new plan of attack</strong></p> <p>During the Johannesburg attack, city employees received a computer message saying hackers had “compromised all passwords and sensitive data such as finance and personal population information”. In exchange for not uploading the stolen data online, destroying it and revealing how they executed the breach, the hackers demanded four bitcoins (worth about A$52,663) - “a small amount of money” for a vast city council, they said.</p> <p><em><a href="https://images.theconversation.com/files/299645/original/file-20191031-187903-1ykyg4q.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/299645/original/file-20191031-187903-1ykyg4q.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" /></a> <span class="caption">The hacker group operated a Twitter account, on which they posted a photo showing the directories they had access to.</span> <span class="attribution"><span class="source">ShadowKillGroup/twitter</span></span></em></p> <p>In this case, access to data was not denied. But the threat of releasing data online can put enormous pressure on authorities to comply, or they risk releasing citizens’ sensitive information, and in doing so, betraying their trust.</p> <p>The city of Johannesburg decided <a href="https://coingeek.com/we-shall-not-pay-the-ransom-johannesburg-tells-hackers/">not to pay the ransom</a> and to restore systems on its own. Yet we don’t know whether the data has been released online or not. The attack suggests cybercriminals will continue to experiment and innovate in a bid to defeat current prevention and defence measures against leakware attacks.</p> <p><a href="https://images.theconversation.com/files/299644/original/file-20191031-187898-hhld2p.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/299644/original/file-20191031-187898-hhld2p.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" /></a> <span class="caption">This login screen message was displayed on computers in Johannesburg following the attack.</span> <span class="attribution"><span class="source">pule_madumo/twitter</span></span></p> <p>Another notable leakware attack happened a decade ago against the US state of Virginia. <a href="https://www.govtech.com/security/Cyber-Criminal-Demands-10-Million.html">Hackers stole</a> prescription drug information from the state and tried obtaining a ransom by threatening to either release it online, or sell it to the highest bidder.</p> <p><strong>When to trust the word of a cybercriminal?</strong></p> <p>Ransomware attack victims face two options: <a href="https://www.sciencedirect.com/science/article/pii/S1361372316300367">pay, or don’t pay</a>. If they choose the latter, they need to try other methods to recover the data being kept from them.</p> <p>If a ransom is paid, criminals will often decrypt the data as promised. They do this to encourage compliance in future victims. That said, paying a ransom <a href="https://www.bleepingcomputer.com/news/security/paying-the-coverton-ransomware-may-not-get-your-data-back/">doesn’t guarantee the release or decryption of data</a>.</p> <p>The type of attack experienced in Johannesburg poses a new incentive for criminals. Once the attackers have stolen the data, and have been paid the ransom, the data still has extractive value to them. This gives them <a href="https://arxiv.org/pdf/1707.06247.pdf">duelling incentives</a> about whether to publish the data or not, as publishing it would mean they could continue to extort value from the city by targeting citizens directly.</p> <p>In cases where victims decide not to pay, the solution so far has been to have strong, separate and updated <a href="https://www.csoonline.com/article/3331981/how-to-protect-backups-from-ransomware.html">data backups</a>, or use one of <a href="https://www.nomoreransom.org/en/index.html">the passkeys available online</a>. Passkeys are decryption tools that help regain access to files once they’ve been held at ransom, by applying a repository of keys to unlock the most common types of ransomware.</p> <p>But these solutions don’t address the negative outcomes of leakware attacks, because the “<a href="https://www2.deloitte.com/content/dam/Deloitte/bm/Documents/risk/cayman-islands/2017%20Deloitte%20-%20Taking%20data%20hostage%20-%20The%20rise%20of%20ransomware.PDF">hostage</a>” data is not meant to be released to the victim, but to the public. In this way, criminals manage to innovate their way out of being defeated by backups and decryption keys.</p> <p><strong>The traditional ransomware attack</strong></p> <p>Historically, <a href="https://www.techopedia.com/definition/4337/ransomware">ransomware attacks denied users access to their data, systems or services</a> by locking them out of their computers, files or servers. This is done through obtaining passwords and login details and changing them fraudulently through the process of <a href="https://en.wikipedia.org/wiki/Phishing">phishing</a>.</p> <p>It can also be done by encrypting the data and converting it to a format that makes it inaccessible to the original user. In such cases, criminals contact the victim and pressure them into paying a ransom in exchange for their data. The criminal’s success depends on both the value the data holds for the victim, and the victim’s inability to retrieve the data from elsewhere.</p> <p>Some cybercriminal groups have even developed complex online “<a href="https://www.computerworld.com/article/3173698/ransomware-customer-support-chat-reveals-criminals-ruthlessness.html">customer support</a>” assistance channels, to help victims buy cryptocurrency or otherwise assist in the process of paying ransoms.</p> <p><strong>Trouble close to home</strong></p> <p>Facing the risk of losing sensitive information, companies and governments often pay ransoms. This is <a href="https://www.synergetic.net.au/ransomware-attacks-on-the-rise-in-australia/">especially true</a> in Australia. Last year, 81% of Australian <a href="https://www.synergetic.net.au/ransomware-attacks-on-the-rise-in-australia/">companies</a> that experienced a cyberattack were held at ransom, and 51% of these paid.</p> <p>Generally, paying tends to <a href="http://www.rmmagazine.com/2016/05/02/ransomware-attacks-pose-growing-threat/">increase the likelihood</a> of future attacks, extending vulnerability to more targets. This is why ransomware is a rising global threat.</p> <p>In the first quarter of 2019, <a href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf">ransomware attacks went up by 118%</a>. They also became more targeted towards governments, and the healthcare and legal sectors. Attacks on these sectors are now more lucrative than ever.</p> <p>The threat of leakware attacks is increasing. And as they become more advanced, Australian city councils and organisations should adapt their defences to brace for a new wave of sophisticated onslaught.</p> <p>As history has taught us, it’s <a href="https://www.theguardian.com/australia-news/2019/oct/01/systems-shut-down-in-victorian-hospitals-after-suspected-cyber-attack">better to be safe</a> than sorry.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;" src="https://counter.theconversation.com/content/126190/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http://theconversation.com/republishing-guidelines --></p> <p><em><a href="https://theconversation.com/profiles/roberto-musotto-872263">Roberto Musotto</a>, Cyber Security Cooperative Research Centre Postdoctoral Fellow, <a href="http://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/brian-nussbaum-874786">Brian Nussbaum</a>, Assistant Professor at College of Emergency Preparedness, Homeland Security and Cybersecurity, <a href="http://theconversation.com/institutions/university-at-albany-state-university-of-new-york-1978">University at Albany, State University of New York</a></em></p> <p><em>This article is republished from <a href="http://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/hackers-are-now-targeting-councils-and-governments-threatening-to-leak-citizen-data-126190">original article</a>.</em></p>

Technology

Placeholder Content Image

7 alarming things a hacker can do when they have your email address

<p><strong>1. Send emails from your address</strong></p> <p>This is probably the most obvious thing hackers can do with your email address, and it’s a nuisance for sure. Once hackers have your email address, they can use it to target more than just you, sending out email blasts to anyone (maybe even everyone!) in your contact list. As Garry Brownrigg, CEO &amp; Founder of <a href="https://www.quicksilk.com/">QuickSilk</a>, explains, “They can ‘spoof’ an email message with a forged sender address – they don’t even need your password for this.” The things they send can be anything from harmful malware to scams and requests for money; either way, you’d certainly rather they didn’t come from your address.</p> <p>And although it’s mostly harmless (most savvy internet users are able to catch on when they receive a scam email from a friend’s address), it could still be a problem in some cases. “If a criminal really wanted to hurt someone, they could use this as a way to hook a romantic partner, hack the victim’s employer, get the person in trouble at work, or cause any number of problems in their personal or professional life by impersonating them online,” says Jason Glassberg, co-founder of <a href="https://www.casaba.com/">Casaba Security</a> and former cybersecurity executive at Ernst &amp; Young and Lehman Brothers.</p> <p><strong>2. Send phishing emails</strong></p> <p>Since there isn’t a lot that hackers can do with just the email address, they’re not going to stop there. “When a hacker knows your email address, they have half of your confidential information – all they need now is the password,” warns Greg Kelley of <a href="https://www.vestigeltd.com/">Vestige Digital Investigations</a>. They employ a few different methods to access it, the most common being the phishing email. This is an email, in the guise of being a legitimate email from a trusted source, designed to trick you into logging in. “They might create a legitimate-sounding email that appears to be sent from a service such as Amazon, eBay, Paypal or any number of other popular services… Links in phishing emails will always direct the user to a purposefully built website that looks identical to the real service,” explains Ray Walsh, a digital privacy expert at <a href="https://proprivacy.com/">ProPrivacy.com</a>. “However, if people use the login on that fake website, the hacker instantly receives the credential and password for the real account.”</p> <p>Another way they can do this, ironically, is by sending you an email saying that your account is compromised or has been accessed from a new device, so you need to change your password for security reasons. (You’ve almost definitely had one of those at one point or another!) When you change your password, then your account really is compromised and the hacker has your password. Once hackers have your password, the range of things they can do becomes much greater.</p> <p><strong>3. Access your online accounts</strong></p> <p>Nowadays, our emails do double duty as our logins for scores of social media sites, in addition to Google Docs, online retailers, and so on. Internet users also have a very understandable tendency to use the same passwords for all of these accounts. And even if you don’t use the same password, the hacker can click the old ‘forgot password’ button and use the resulting email – which comes to your email address, which they do have the password for – to change the password, and voilà. Your accounts are their accounts, and they have access to anything on them that you do.</p> <p><strong>4. Access personal information</strong></p> <p>The things hackers can do with your information seem to be something of a chain reaction. Once a hacker has access to your online accounts, just think about all of the information that is right at their fingertips. Allan Buxton, Director of Forensics at SecureForensics, sums it up: “At a minimum, a search on Facebook can get a public name and, unless privacy protections are in place, the names of friends and possibly pictures,” he says. “Throw that email address into LinkedIn, and they’ll know where you work, who your colleagues are, your responsibilities, plus everywhere you worked or went to school. That’s more than enough to start some real-world stalking. That’s just two sites – we haven’t talked about political views, travel or favourite places they might glean from Twitter or Instagram.”</p> <p>Glassberg admits that such ‘real-world stalking’ is rare, sure, but anything is possible in an era where people document nearly everything online.</p> <p><strong>5. Steal financial information</strong></p> <p>Things start to get really problematic if hackers are able to find your credit or debit card information – which, more likely than not, you’ve sent via email at one point or another. Your online bank accounts can also be a major target for hackers, especially if you use your email address as a login for those, too. And, needless to say, once a hacker has access to those, your money is in serious jeopardy. “This is one of the biggest risks you’ll face from an email hack,” Glassberg says. “Once [hackers] have the email, it’s easy to reset the bank account and begin issuing transactions.” In addition to potentially being devastating of your finances, this can also hurt your credit score, as <a href="https://www.beenverified.com/">BeenVerified</a>’s Chief Communications Officer Justin Lavelle explains: “Cybercriminals can use your credit card details, open bank accounts in your name, and take out loans. It will likely ruin your credit card’s rating and your credit report will take a hit.”</p> <p><strong>6. Blackmail you</strong></p> <p>As if things weren’t scary enough, hackers can use your personal info to ruin, or threaten to ruin, your reputation. This is fairly rare, but it can happen, especially if a hacker finds something that the user wouldn’t want to be seen publicly. “[Hackers] can use this access to spy on you and review your most personal emails,” says Daniel Smith, head of security research at <a href="https://www.radware.com/">Radware</a>. “This kind of information could easily be used to blackmail/extort the victim.”</p> <p><strong>7. Steal your identity</strong></p> <p>This is definitely a worst-case scenario, but “once the hacker has your personally identifiable information, they can steal your identity,” Brownrigg warns. With information like your tax file number and credit card info, identity theft can sadly be well within reach for hackers. So, if you start noticing signs someone just stole your identity, consider that your email address may have been compromised.</p> <p><strong>How you can stay safe from hackers</strong></p> <p>Hopefully, though, you won’t have to encounter any of these problems, and there are some measures you can take to keep your information safe. Avoid using your verbatim email address as a login for other sites, and make sure that your password is strong and difficult to guess. You should also change those passwords every couple of months or so for maximum security. Glassberg also recommends securing your email account with two-factor authentication. This “[requires] a one-time code to be entered alongside the password in order to gain access to the email account,” he told RD. “In most cases, the code will be texted to the person’s phone, but there are also apps you can use, like Google Authenticator.”</p> <p>And, of course, just use common sense. Don’t share information or type in your email password on public WiFi networks, and be smart about the information you share over email.</p> <p><strong>What to do if you think you’ve been hacked</strong></p> <p>Starting to notice some strange online activity? There are a couple of ways you can try to get ahead before it gets too bad. If you hear about spam emails being sent from your address, change your password immediately. You should also tell your contacts so that they know to ignore anything coming from you. Finally, Lavelle offers some other suggestions: “Change your email settings to the highest privacy setting, scan your computer for malware and viruses, and be sure your browsers are updated,” he says.</p> <p><em>Written by Meghan Jones. This article first appeared in </em><em><a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/7-alarming-things-a-hacker-can-do-when-they-have-your-email-address">Reader’s Digest</a>. For more of what you love from the world’s best-loved magazine, </em><a href="http://readersdigest.innovations.co.nz/c/readersdigestemailsubscribe?utm_source=over60&amp;utm_medium=articles&amp;utm_campaign=RDSUB&amp;keycode=WRN93V"><em>here’s our best subscription offer</em></a><em>.</em></p> <p><img style="width: 100px !important; height: 100px !important;" src="https://oversixtydev.blob.core.windows.net/media/7820640/1.png" alt="" data-udi="umb://media/f30947086c8e47b89cb076eb5bb9b3e2" /></p>

Technology

Placeholder Content Image

How to stop hackers from attacking your mobile phone while online shopping

<p><span style="font-weight: 400;">In new research revealed by Norton’s cyber safety insight report, about 30 per cent of shoppers have fallen victim to cybercrime in the past year at a cost of a shocking $1.3 billion.</span></p> <p><span style="font-weight: 400;">The report noted that 21 per cent of smartphone users had no idea that their device was able to be hacked.</span></p> <p><span style="font-weight: 400;">Cybercrime expert Julian Plummer agrees that users are laxer about mobile security compared to their laptops.</span></p> <p><span style="font-weight: 400;">“As mobile becomes increasingly de rigueur the security risk to consumers will only rise,” said Mr Plummer, who is the managing director of Midwinter Financial Services in Sydney.</span></p> <p><span style="font-weight: 400;">There are two ways that your smartphone is able to be hacked, which is phishing and over public wi-fi networks.</span></p> <p><span style="font-weight: 400;">As hackers are only getting smarter at duping their victims when it comes to phishing, sophisticated criminals are now impersonating big-name brands, including banks and other institutions.</span></p> <p><span style="font-weight: 400;">“It used to be that seeing a padlock in the URL bar meant that the site was safe, but now hackers are ‘securing’ their sites using cheap security certificates to provide a false sense of security,” Mr Plummer warned to </span><a href="https://thenewdaily.com.au/life/tech/2019/05/29/mobile-phone-cybercrime-safety/"><span style="font-weight: 400;"><em>The New Daily</em></span></a><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">The second way is via public Wi-Fi networks, which is surprisingly sophisticated.</span></p> <p><span style="font-weight: 400;">“Hackers use a ‘Wi-Fi pineapple’ to mimic a public wi-fi access point,” he explained.</span></p> <p><span style="font-weight: 400;">“Unfortunately, logging on to these malicious wi-fi access points allows hackers to intercept any unencrypted personal data. Always be very wary when connecting to an untrusted wi-fi network – especially overseas.”</span></p> <p><span style="font-weight: 400;">It’s easy to protect yourself from hackers though, according to Mr Plummer.</span></p> <p><span style="font-weight: 400;">“The crucial thing for mobile phone users is to stop reusing passwords,” Mr Plummer said.</span></p> <p><span style="font-weight: 400;">“With a major security breach happening almost on a monthly basis, if hackers were to get your password from one shopping website, they then have access to all your online accounts if you re-use your password.”</span></p> <p><span style="font-weight: 400;">The second way to keep your information safe might be tedious, but it’ll be worth it in the long run. It involves keeping your phone’s operating system up to date.</span></p> <p><span style="font-weight: 400;">“The main reason manufacturers provide updates is to close off security loopholes within their device,” Mr Plummer said.</span></p> <p><span style="font-weight: 400;">“Hackers are well versed in any security bugs in your mobile device, so make sure you have automatic updates turned on for your mobile phone.”</span></p>

Technology

Placeholder Content Image

The scary new way hackers can find out your passwords

<p><span style="font-weight: 400;">New research from the University of Cambridge in England as well as Sweden’s Linköping University has explained that malware is now capable of accurately guessing your passwords by listening to the sound of your fingers tapping the screen.</span></p> <p><span style="font-weight: 400;">The hackers use the malware to listen via the microphone of your smartphone and use technology that can accurately guess where you’re touching the screen to get every password you use on the smartphone device. </span></p> <p><span style="font-weight: 400;">“We showed that the attack can successfully recover PIN codes, individual letters and whole words,” researchers wrote in the paper, according to </span><a href="https://www.9news.com.au/technology/iphone-android-hackers-can-find-out-your-passwords-by-hearing-how-you-type/bf7c66ce-0d49-4c26-8be2-1dd5c6196d30"><span style="font-weight: 400;">9News</span></a><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">“We have shown a new acoustic side-channel attack on smartphones and tablets.”</span></p> <p><span style="font-weight: 400;">Research showed that during testing, the machine learning software correctly guessed a four-digit passcode 73 per cent of the time after ten tries.</span></p> <p><span style="font-weight: 400;">The software was also able to identify 30 per cent of passwords that ranged from seven to 13 characters in length after 20 tries.</span></p> <p><span style="font-weight: 400;">The malware is reliant on machine learning to predict which key a user has tapped by tracking which sound the microphone heard first. This is a detail that is picked up in a matter of seconds.</span></p>

Technology

Placeholder Content Image

Warning: WhatsApp voicemail scam gives hackers access to your account

<p>A worrying new WhatsApp hack allows cyber criminals to access victim’s accounts via their voicemail inbox.</p> <p>According to <a href="https://nakedsecurity.sophos.com/2018/10/08/attackers-use-voicemail-hack-to-steal-whatsapp-accounts/"><strong><em style="font-weight: inherit;"><u>Naked Security</u></em></strong></a>, a blog run by British security company Sophos, scammers are attempting the attacks at night so they can take advantage of the app’s six-digit verification code.</p> <p>The attacks have become so prevalent that Israel’s National Cyber Security Authority issued a nationwide warning.</p> <p>Hackers start the scam by installing WhatsApp on their own phone using a legitimate user’s phone number.</p> <p>To verify the login attempt, WhatsApp sends a six-digit verification code via text message to the victim’s telephone.</p> <p>However, hackers are carrying out this scam at night, so victims are most likely sleeping rather than checking their phones.</p> <p>WhatsApp then allows the hacker to send the six-digit verification code via phone call with an automated message.</p> <p>As the victim is not on their phone, the message ideally goes to voicemail.</p> <p>The cyber criminal then exploits a security flaw in many telecommunication networks which allows customers to use a generic phone number to call and retrieve their voicemails.</p> <p>For many mobile phone owners, only a four-digit pin is required to access their voicemails – which if they haven’t changed is commonly 0000 or 1234 by default.</p> <p>Hackers will then enter the password and gain access to the victim’s voicemail inbox, allowing them to retrieve the WhatsApp message containing the six-digit code.</p> <p>Once the scammer enters the code into their own phone, they have complete access to the victim’s WhatsApp account.</p> <p>To avoid being hacked, it is recommended that users turn on two-factor authentication on their account, adding an extra layer of security.</p> <p>“Using application-based 2FA ... mitigates a lot of the risk, because these mobile authentication apps don’t rely on communications tied to phone numbers,” Sophos researchers explained. </p> <p>This can be done by navigating to Settings in WhatsApp, then tapping ‘Account’.</p> <p>Users must then press on ‘Two-step verification’ and tap ‘Enable’.</p> <p>Experts also encourage users to have a strong PIN on their voicemail inbox.</p> <p>Have you encountered this WhatsApp scam? Let us know in the comments below. </p>

Technology

Placeholder Content Image

WhatsApp scam that sends fake messages from you

<p><span>A new bug discovered within popular messaging app WhatsApp allows hackers to infiltrate and message your contacts.</span></p> <p><span>Experts have warned that when the bug is combined with existing glitches, it allows hackers to send messages to your friends and family.</span></p> <p><span>The bug, first identified by Check Point Research cybersecurity analysts, was created by vulnerabilities between WhatsApp for mobile and for web, where users must sync in order to send messages via desktop.</span></p> <p><span>On their website, Check Point said the bug could “allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.”</span></p> <p><span>According to Check Point, hackers can manipulate users' messages and change the identity of a sender in the group conversation, even if that person is not a member of the group.</span></p> <p><span>Hackers can also send a private message to a group chat member, but when the targeted individual responds, everyone in the conversation can see it.</span></p> <p><span>The bug will enable hackers to impersonate users and spread fake news.</span></p> <p><span>The researchers who discovered the bug, believe it is of the “utmost importance” that WhatsApp fixes the problem immediately, however, the Facebook-owned company has “acknowledged” the flaws but said it was a part of the app’s “design framework”.</span></p> <p><span>In a recent blog post, WhatsApp wrote: “WhatsApp cares deeply about your safety.</span></p> <p><span>“We encourage you to think before sharing messages that were forwarded.</span></p> <p><span>“As a reminder, you can report spam or block a contact in one tap and can always reach out to WhatsApp directly for help.”</span></p>

Technology

Placeholder Content Image

Why you shouldn’t wish people “Happy Birthday” on Facebook

<p>Wishing a happy birthday on Facebook could get your account hacked and your private information stolen, a new survey has found.</p> <p>When combined with other information gleaned from Facebook posts, the annual birthday wishes could give scammers enough details to steal sensitive data.</p> <p>A survey by <a rel="noopener" href="https://www.nationwide.co.uk/oversharing" target="_blank"><span style="text-decoration: underline;"><strong>Nationwide</strong> </span></a>of people aged 16-25 found that 83 per cent said their friends “overshared” online, including information like their relationship status, health and political beliefs, and holiday updates. Up to 56 per cent of respondents said friends also share their current location on Facebook.</p> <p>These types of revealing posts are a goldmine for hackers and can even put homes at risk of burglary.</p> <p>“Social media is a great way for people to connect with friends or family, but it’s important to think about the information you are sharing with others, so it doesn’t fall into the wrong hands,” said Stuart Skinner, director of fraud at Nationwide.</p> <p>He continued: “Wishing someone a happy birthday or sharing your location may seem innocent enough, but fraudsters can piece together information from various places, collecting enough to defraud people.</p> <p>“To protect yourself, check privacy settings so only vetted friends can see updates, don’t give away too much information or anything you wouldn’t want a fraudster to see, have a strong password that doesn’t use any of your personal information and stop and think before sharing.”</p>

Technology

Placeholder Content Image

Security flaw in Wi-Fi leaves millions at risk

<p>The US government and security researchers worldwide have issued warnings of a newly discovered flaw in a widely used Wi-Fi encryption protocol.</p> <p>The US government’s Computer Emergency Response Team (CERT) issued a warning saying the security flaw can open the door to hackers seeking to eavesdrop or hijack devices using wireless networks.</p> <p>“Exploitation of these vulnerabilities could allow an attacker to take control of an affected system," said CERT.</p> <p>The agency’s warning follows research by computer scientists at the Belgian university KU Leuven, who named the security flaw KRACK, for Key Reinstallation Attack.</p> <p>Ars Technica has reported that the discovery was a closely guarded secret for weeks in order to allow Wi-Fi systems to develop security measures.</p> <p>The Wi-Fi encryption protocol with the security flaw, WPA2, allows hackers “to read information that was previously assumed to be safely encrypted," said a blog post by KU Leuven researcher Mathy Vanhoef.</p> <p>“This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.”</p> <p>Mathy also said the flaw may allow an attacker “to inject ransomware or other malware into websites.”</p> <p>The Belgian researchers said in a research paper that devices on all operating systems may be vulnerable to KRACK, including 41 per cent of Android devices.</p> <p><strong>The risk</strong></p> <p>According to researchers, the flaw is dangerous due to the difficulty in patching millions of wireless systems.</p> <p>“Wow. Everyone needs to be afraid," said Rob Graham of Errata Security in a blog post.</p> <p>“It means in practice, attackers can decrypt a lot of Wi-Fi traffic, with varying levels of difficulty, depending on your precise network setup.”</p> <p>Researchers at Finland-based security firm F-Secure said the discovery of the flaw confirms longstanding concerns about Wi-Fi systems’ vulnerability.</p> <p>“The worst part of it is that it’s an issue with Wi-Fi protocols, which means it affects practically every single person in the world that uses Wi-Fi networks," F-Secure said in a statement.</p> <p>F-Secure researchers said Wi-Fi users can minimise the risks by using virtual private networks and by updating devices including routers.</p> <p>The Wi-Fi Alliance, an industry group who sets standards for wireless connections, said computer users should not panic.</p> <p>“There is no evidence that the vulnerability has been exploited maliciously, and Wi-Fi Alliance has taken immediate steps to ensure users can continue to count on Wi-Fi to deliver strong security protections,” the group said in a statement.</p> <p>“Wi-Fi Alliance now requires testing for this vulnerability within our global certification lab network and has provided a vulnerability detection tool for use by any Wi-Fi Alliance member."</p> <p>On October 10, Microsoft released a patch to protect users of Windows devices.</p> <p>“Customers who have Windows Update enabled and applied the security updates, are protected automatically," Microsoft said.</p> <p>A Google spokesman said, “We’re aware of the issue, and we will be patching any affected devices in the coming weeks.”</p>

Technology

Placeholder Content Image

Simple Facebook trick could let anyone hack into your account

<p>A cyber security expert claims hackers can get into anyone’s Facebook account simply if they have access to their old phone number. </p> <p>Facebook lets users recover access to their account if they’ve forgotten their password by typing in their phone number, getting a code texted to their phone and then resetting the password.</p> <p>However, if someone has a new phone number and not unlinked their old number from their Facebook account, hackers are able to use the sneaky trick to gain access to victims’ Facebook profiles.</p> <p>In a <a href="https://medium.com/@jkmartindale/i-kinda-hacked-a-few-facebook-accounts-using-a-vulnerability-they-wont-fix-2f5669794f79">Medium post</a>, tech expert James Martindale wrote: “Your Facebook account is a treasure trove worth a good chunk of money.”</p> <p>Martindale claims he was able to access a stranger’s account by typing in his old phone number. Numbers are often recycled and given to new owners when they fall out of use.</p> <p>Facebook also lets you search for people who have associated phone numbers with their accounts.</p> <p>There is big money to be made in social media profiles, apparently.</p> <p>Martindale claims that hackers could sell hacked Facebook accounts for more than $50 an account.</p> <p>“I guarantee you that somebody out there has already smelled the money, figured this out, and is on the prowl chasing after accounts they can resell,” Martindale added.</p>

Technology

Placeholder Content Image

How hackers can get into your accounts without the password

<p>On Wednesday morning, high-profile Twitter accounts were hacked and then flooded with swastika-laden propaganda.</p> <p>Twitter accounts such as Duke University, Forbes and Amnesty International were victims of this latest online scandal.</p> <p>These accounts are most likely protected by high security measures including two-factor authentication and strong protections. Although these measures are important, hackers have found a way to bypass them.</p> <p>Hackers are now using app permissions to infiltrate online accounts. App permissions involve logging into an app or service by using one of your key social accounts such as your Google, Facebook or Twitter account. This feature allows you to worry about fewer passwords and sometimes is necessary for apps to work with other accounts, but it also presents security issues.</p> <p>This recent hack was caused by an app called “Twitter Counter”. This app provides analytics of Twitter accounts and the app not only requests permission to see your data, but to also Tweet. This feature could prove helpful if you want to send out tweets inside the app but this is how these high-profile accounts were compromised.</p> <p>Apps that have permissions are generally limited in the access they have over your account. In most cases, they don’t have the ability to change your password and they also never get your real password. Your main account just gives them a generated one once you use that account to sign up. Although you can still have control over your password and regain your account back, once an account has been infiltrated, the world has already seen the information the hacker has posted on your profile.</p> <p><strong>The solution</strong></p> <p>Take a look at what apps have access to the accounts you use online. Revoke as many permissions as you can and create a practice of checking it regularly.</p> <p>On Twitter, click on your avatar on the top right next to the “Tweet button” and then press <strong>Settings and privacy</strong>. Look at the list on the left side and then select <strong>Apps</strong> and you can scroll through and revoke access to any apps that don’t need to be linked to your Twitter account.</p> <p>On your Google account, conduct a <a href="https://myaccount.google.com/secureaccount" target="_blank"><strong><span style="text-decoration: underline;">Security Check-up</span></strong></a> which will automatically run through your app permissions. Then revoke the apps that have permission to use your account.</p> <p>On your Facebook account, click on the question mark menu on the left side of your notifications icon and select <strong>Privacy</strong>. On the left-hand side select <strong>Apps</strong> and then press <strong>Show All</strong> at the bottom of the box that is marked with <strong>Logged in with Facebook</strong>. Get rid of any apps that you don’t need on the list. </p>

Technology

Placeholder Content Image

Why you should never charge your phone in a public port

<p>How many times have you been out and about only to realise your phone’s battery is running dangerously low? Well, if you’re one of the thousands of people who don’t hesitate to take out your charger and plug your phone in to an available USB port or power point, you could be putting yourself at risk.</p> <p>Data security experts have found a growing number of public ports to be compromised by hackers, who, just like when you transfer data from your phone to your computer via USB, can download photos, messages, contacts and more.</p> <p>“Just by plugging your phone into a [compromised] power strip or charger, your device is now infected, and that compromises all your data,” Security expert Drew Paik from Authentic8 told <a href="http://money.cnn.com/2017/02/15/technology/public-ports-charging-bad-stop/" target="_blank"><strong><span style="text-decoration: underline;">CNN</span></strong></a>.</p> <p>With so many shopping centres, airports, hospitals and other public places now offering charging hubs, it’s never been easier for hackers. So, aside from avoiding public outlets altogether – which can sometimes be impossible – what else can you do to protect your data?</p> <p><strong>Here are our top tips:</strong></p> <ul> <li>Ensure your phone is fully charged before leaving the house.</li> <li>Invest in a decent portable charger.</li> <li>Look into purchasing a USB cord which can charge your phone, but won’t transfer data.</li> <li>If you have no choice but to use a public port, ensure your phone is secured with a PIN to give yourself the best chance of avoiding hackers.</li> </ul> <p><strong>Related links:</strong></p> <p><a href="/news/news/2017/02/clooneys-reveal-sex-of-twins/"><span style="text-decoration: underline;"><em><strong>George and Amal Clooney have revealed the sex of their twins</strong></em></span></a></p> <p><a href="/news/news/2017/02/families-with-polite-kids-given-discount-at-restaurant/"><strong><em><span style="text-decoration: underline;">Families with polite kids get discount at Italian restaurant</span></em></strong></a></p> <p><a href="/news/news/2017/02/woman-gives-birth-while-in-a-coma/"><span style="text-decoration: underline;"><em><strong>Woman gives birth while in a coma</strong></em></span></a></p>

News

Placeholder Content Image

9 mistakes that put your computer at risk of hacking

<p>Forget the days of safes, bank lockers and filing cabinets – today, most of us rely on hard drives and motherboards to keep our important personal data safe. That’s why it’s essential to take every possible measure to prevent your information being corrupted by hackers. Here are nine mistakes you may be making that could put your computer at risk of corruption.</p> <ol start="1"> <li><strong>Using the same password for everything</strong> – yes, it’s the easiest way to keep track of all your online accounts, but if a hacker cracks the code for one site, they can easily crack the rest. If you have difficulty remembering your passwords, try a free program like <a href="https://lastpass.com/" target="_blank"><strong><span style="text-decoration: underline;">LastPass</span></strong></a> or <a href="https://1password.com/" target="_blank"><strong><span style="text-decoration: underline;">1Password</span></strong></a>, which store your passwords and let you unlock accounts with one master password.</li> <li><strong>Using an easy-to-guess password</strong> – forget using your name and birthday. Even your pet’s name may be too easy. Experts recommend using a mixture of numbers, upper and lower case letters and punctuation. They’re much more difficult to crack, and if you use one of the programs above, they shouldn’t cause too much of a hassle to your memory.</li> <li><strong>Not blocking your webcam</strong> – sadly, even our humble webcams aren’t safe from hackers. Even Facebook CEO Mark Zuckerberg covers his laptop camera and microphone with tape to stop hackers secretly recording your activity.</li> <li><strong>Giving your information too easily</strong> – if you click “allow” when asked for access to the camera and microphone on your computer or tablet, you may be giving the hackers exactly what they want. If the app has no need for such access, simply deny it.</li> <li><strong>Delaying updates</strong> – software companies don’t issue updates just to annoy you – they contain essential security updates. So bite the bullet and update right away.</li> <li><strong>Using public Wi-Fi</strong> – we’ve <a href="/news/news/2016/09/think-twice-before-using-public-wifi-networks/" target="_blank"><strong><span style="text-decoration: underline;">covered this before</span></strong></a>, but using unsecured Wi-Fi hotspots in public can leave your information open to anyone else on that network. Stick to hotspots labelled “WPA” or “WPA2”, or opt for mobile data instead.</li> <li><strong>Keeping your home Wi-Fi network public</strong> – just like above, if your home network isn’t secured with a strong password, you’re only making the hackers’ job easier.</li> <li><strong>Making an account with every online retailer</strong> – while it’s fine to leave your details with reputable online stores that you frequently use (or with PayPal), sharing your credit card information with too many websites could spell disaster – especially if you don’t know much about the retailer’s reputation.</li> <li><strong>Opening every email</strong> – if you recognise the sender, go for it. If there’s something that comes through from an unknown contact, it may be malicious spam. Your best bet is to avoid clicking on any links in emails from senders you don’t know (or even senders you do know, but that send suspicious emails) – even “unsubscribe” links can put you at risk.</li> </ol> <p>How do you keep your personal data safe? Share your tips with us in the comments below.</p> <p><strong>Related links:</strong></p> <p><a href="/news/news/2016/09/think-twice-before-using-public-wifi-networks/"><span style="text-decoration: underline;"><em><strong>Think twice before using public wifi networks</strong></em></span></a></p> <p><a href="/news/news/2016/09/popular-phone-recalled-due-to-exploding-batteries/"><strong><span style="text-decoration: underline;"><em>Popular phone recalled due to exploding batteries</em></span></strong></a></p> <p><a href="/news/news/2016/07/sony-recalled-a-camera-that-could-see-through-clothes/"><strong><em><span style="text-decoration: underline;">Sony recalls a camera that could see through clothes</span></em></strong></a></p>

News

Placeholder Content Image

Think twice before using public wifi networks

<p>When you’re out and about, coming across free wifi is a godsend. But beware, before jumping onto the next free wifi network, you need to read this.</p> <p><strong>The dangers of using public wifi</strong></p> <p>With more and more places offering free wifi, including tourist hotspots, it’s common to find a number of wifi network options appear on your device. These public connections are often unsecured or have shared passwords. By logging on to the network, you’re taking a risk as hackers often target public networks.</p> <p>Hackers just need to be near you to steal your data. They log on to the same network and start stealing your information using software that is easily downloaded from the internet. They can see what you’re doing online, steal your login details, your password and yes, even your identity.</p> <p>Another way that hackers can access your data is to create a public network that you think you can trust, such as a McDonald’s or the Apple Store.</p> <p><strong>What you need to do to protect yourself</strong></p> <p>Refrain for typing your user name or passwords, or any other sensitive information, when using a public wifi network. Don’t pay for things when on public wifi either.</p> <p>As all security experts advise, make sure you don’t have a password that’s easy to crack. Even if hackers don’t find out your password, a weak password can be easily discovered with sophisticated technology. Passwords with a mix of upper and lower case letters, numbers and symbols are considered strong passwords.</p> <p><strong>Related links: </strong></p> <p class="subbuzzdescwattr"><span style="text-decoration: underline;"><strong><a href="http://www.oversixty.com.au/entertainment/technology/2016/08/what-to-do-when-you-lose-a-phone/"><em>What to do when you lose a phone</em></a></strong></span></p> <p class="subbuzzdescwattr"><span style="text-decoration: underline;"><strong><a href="http://www.oversixty.com.au/entertainment/technology/2016/08/tips-to-speed-up-a-slow-ipad/"><em>6 tips to speed up a slow iPad</em></a></strong></span></p> <p class="subbuzzdescwattr"><span style="text-decoration: underline;"><strong><a href="http://www.oversixty.com.au/entertainment/technology/2016/08/how-to-secure-your-wi-fi-network-from-hackers/"><em>How to secure your Wi-Fi network from hackers</em></a></strong></span></p> <p> </p> <p> </p> <p> </p>

News

Placeholder Content Image

How to secure your Wi-Fi network from hackers

<p>An insecure Wi-Fi network can result in more than just slower internet and a burnt-through data cap. You could lose access yourself or even let private information get into the wrong hands. As more devices in our home become Wi-Fi connected - from your home security to your lightbulbs - making sure your Wi-Fi is secure is more necessary than ever. Here's how.</p> <p><strong>Change passwords</strong></p> <p>This seems obvious, but stick with me. While you might have set a pretty good password for your Wi-Fi network when you set it up – what with capital letters and numbers and everything - the password to log in to your actual router might still be the default.  This means anyone already on your network can easily change the actual Wi-Fi password themselves.</p> <p>(There's also the possibility that your Wi-Fi password is still the one written on the back of your router. You should definitely change that.)</p> <p>To change either of these passwords, you'll want to log in to your router. (Your router is that box with flicking lights that gives you internet. It probably has some antennas.)</p> <p>Open a web browser (Chrome, Safari, Internet Explorer - whatever you use) on a device that's connected to your Wi-Fi and type "192.168.0.1". This should open a login page. (If it doesn't try "192.168.1.1".)</p> <p>Logging in here, disturbingly, should be pretty easy. Check your router's make and model here or on Google. It's likely "admin" and "admin" or "admin" and "password".</p> <p>Once you've logged in you should see your router's settings page. Each one of these is different, but changing the password for both the router and the Wi-Fi network itself should be relatively easy. If not, Google is your friend. Remember to go long and to add numbers. If you're worried about forgetting it, try a long sentence of song lyrics along with a few numbers - easy to remember, extremely hard for a computer to crack.</p> <p><strong>Change the name of your network</strong></p> <p>If your Wi-Fi network already has some dumb joke name, skip this section. If it's called NETGEAR 5345 or something like that, time to get one of those dumb joke names. You can do this, again, by logging into your router. Look for an option to change the "SSID".</p> <p>Why? Because for potential hackers, knowing the type of router or connection you have makes the job a lot easier. Getting rid of the default name makes this a bit harder for them.</p> <p><strong>Encrypt your network</strong></p> <p>Your router is likely already encrypted with WAP encryption, which is fairly standard, but is also quite easy to crack. Luckily, most newer routers should offer "WPA2" encryption - don't worry about what it means - which is much stronger. However, it also will lock out any device from prior to 2006, so if you've got some ancient laptop somewhere, be wary.</p> <p>To do this, you're going to want to - once again - log in to your router. (See why it's so important to make sure your router is password protected too?) Encryption options should be under security settings.</p> <p><strong>Restrict your Wi-Fi to certain devices</strong></p> <p>This is something of a nuclear option, and can be extremely inconvenient. Basically, instead of allowing any device with the right password onto your network, it will restrict the network to only allow access for devices on a list. To do this, assemble a list of all the MAC addresses of every device you own, then input them into their router. MAC addresses are basically unique IDs for every device that has Wi-Fi - Google how to find them on each of your smartphones, laptops, tablets, and consoles.</p> <p>Once you've got that list, log back in to your router and into the security settings again.</p> <p>Have you ever taken measures to secure your Wi-Fi? Do you think you’re going to take them now? Share your thoughts in the comments.</p> <p><em>First appeared on <a href="http://Stuff.co.nz" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p> <p><strong>Related links:</strong></p> <p><a href="/entertainment/technology/2016/06/14-tricks-that-will-change-how-you-use-your-ipad/"><strong><em><span style="text-decoration: underline;">14 tricks that will change how you use your iPad</span></em></strong></a></p> <p><a href="/entertainment/technology/2016/06/how-to-keep-your-facebook-messages-private/"><em><span style="text-decoration: underline;"><strong>How to keep your Facebook messages private</strong></span></em></a></p> <p><a href="/entertainment/technology/2016/05/hints-for-using-gmail/"><em><strong><span style="text-decoration: underline;">5 hints for using Gmail</span></strong></em></a></p>

Technology

Placeholder Content Image

How someone can access you iPhone without a password

<p>Without knowing the password it can be difficult to access somebody’s phone. But a group of tech journalists have figured out a way to bypass the password screen on an iPhone.</p> <p><strong>To do this, you simply do the following:</strong></p> <ol> <li>Hold down the home button until Siri appears.</li> <li>Ask Siri what the time is.</li> <li>When Siri displays the time, click on the image of a clock.</li> <li>This will bring up the World Clock/Alarm/Stopwatch/Timer screen, so click on the timer option.</li> <li>Select "When timer ends."</li> <li>Scroll to the top of the ringtone list and select "Buy more tones."</li> <li>This should open the Apple Store.</li> <li>Click the home button. It should bring up the main phone screen.</li> </ol> <p>You can see this at play in the video above. While there is nothing hacker can do without physically having your phone, it is a timely reminder to be vigilant with your device. </p> <p><em>Video credit: YouTube / SocialStar </em></p> <p><strong>Related links:</strong></p> <p><span style="text-decoration: underline;"><em><strong><a href="/news/news/2016/03/last-official-interview-with-jon-english/">Watch the last interview Jon English gave</a></strong></em></span></p> <p><span style="text-decoration: underline;"><em><strong><a href="/news/news/2016/03/penguin-5000-miles-reunite-71-year-old-man/">Penguin swims 5,000 miles every year to reunite with 71-year-old man</a></strong></em></span></p> <p><span style="text-decoration: underline;"><em><a href="/news/news/2016/03/85-year-old-man-finds-lost-wallet-71-years-later/"><strong>85-year-old man finds lost wallet, 71 years later</strong></a></em></span></p>

News