How ‘digital hygiene’ can beat the hackers


  • English
  • Arabic

ABU DHABI // Internet users are leaving themselves open to hackers who will access their personal accounts and employer’s systems, resulting in disruption and financial losses.

Security consultants warned that a spate of cyber attacks, including the Wannacry and Petya viruses, has held businesses to ransom.

Among the victims were the Ukrainian central bank and Russian oil giant Rosneft.

Simple errors such as opening emails from unknown senders were among the possible causes of the latest attacks.

This week, the UAE telecoms regulator TRA warned users of ransomware, adding: “Do not obey the hackers, there is no guarantee that paying the ransom will lead to the decryption of the files.”

A study by the Global Commission on Internet Governance estimated that 80 per cent of all attacks are a result to lack of user compliance, warning that “digital hygiene, such as downloading software patches, changing passwords and not clicking suspicious links, could address between 80 and 99.9 per cent of all attacks”.

Eddie Schwartz, executive vice president of cyber crimes at DarkMatter’s in Abu Dhabi, described it as “a type of malicious software designed to block access to a computer system until a sum of money is paid – online users should not click on links or attachments included in emails that are unsolicited or from unknown senders”.

Recent attacks mean that “every day individuals need to be aware there are threats everywhere and their behaviour when connected to digital networks needs to be a considered one” stresses Mr Schwartz.

There are a number of basic steps that consumers can take to ensure they are secure on the internet or using applications on their smartphone.

Hackers tend to look for personal information and “it can be a goldmine for criminals looking to spoof our identity. On social media sites like Facebook and Twitter, users should set privacy settings so only their chosen friends can see details. They can also restrict the amount they publish,” said Mr Schwartz.

Phishing is now considered to be one of the most common types of computer attacks, “whereby a criminal pretends to be from a legitimate source, often a bank or utilities provider, to trick customers into giving out passwords or even making a direct payment”.

“As a very basic rule, do not respond to anyone requesting your banking ID, account numbers, username or password, or passport ID, be that by SMS, email or an old-fashioned phone call. Most reputable banks make clear that they never ask for this information in whole after your account has been set up,” said Mr Schwartz.

Joyce Hakmeh, academy fellow with the International Security Department at think tank Chatham House, said “human compliance and vigilance is a must when browsing on the internet or opening links and files from unknown sources”.

Scott Manson, cyber security leader for Middle East and Turkey at Cisco, said one of the ways to protect individuals and companies from ransomware is back everything up, meaning there is no threat of losses, and including on devices like iCloud, which have layers of security.

Mr Scott stressed the importance of backing files to ICloud and other applications to make it harder for hackers to access data and information.

“If vulnerabilities aren’t patched, an organisation will continue to be at risk for infection by this ransomware”.

In another stance, purchasing goods online is a daily event for most of the public, Ms Hakmeh highlights the importance of avoiding fraud by stressing the need to use a credit card instead of a debit card “you can claim fraud on your credit card and can get the money back – however – with a debit card the money can be easily cleared out of an account and you won’t be able to claim it back”.

Mr Manson urged that “it really is down to the cooperation and workplace to implement threats awareness and ways to stay safe on the internet among its employees”.

newsdesk@thenational.ae

How to apply for a drone permit
  • Individuals must register on UAE Drone app or website using their UAE Pass
  • Add all their personal details, including name, nationality, passport number, Emiratis ID, email and phone number
  • Upload the training certificate from a centre accredited by the GCAA
  • Submit their request
What are the regulations?
  • Fly it within visual line of sight
  • Never over populated areas
  • Ensure maximum flying height of 400 feet (122 metres) above ground level is not crossed
  • Users must avoid flying over restricted areas listed on the UAE Drone app
  • Only fly the drone during the day, and never at night
  • Should have a live feed of the drone flight
  • Drones must weigh 5 kg or less
The%20Emperor%20and%20the%20Elephant
%3Cp%3E%3Cstrong%3EAuthor%3A%20%3C%2Fstrong%3ESam%20Ottewill-Soulsby%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPublisher%3A%20%3C%2Fstrong%3EPrinceton%20University%20Press%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPages%3A%20%3C%2Fstrong%3E392%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAvailable%3A%20%3C%2Fstrong%3EJuly%2011%3C%2Fp%3E%0A
COMPANY PROFILE
Name: Kumulus Water
 
Started: 2021
 
Founders: Iheb Triki and Mohamed Ali Abid
 
Based: Tunisia 
 
Sector: Water technology 
 
Number of staff: 22 
 
Investment raised: $4 million 
Sly%20Cooper%20and%20the%20Thievius%20Raccoonus
%3Cp%3E%3Cstrong%3EDeveloper%3A%3C%2Fstrong%3E%20Sucker%20Punch%20Productions%3Cbr%3E%3Cstrong%3EPublisher%3A%3C%2Fstrong%3E%20Sony%20Computer%20Entertainment%3Cbr%3E%3Cstrong%3EConsole%3A%3C%2Fstrong%3E%20PlayStation%202%20to%205%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%205%2F5%3C%2Fp%3E%0A
What are NFTs?

Are non-fungible tokens a currency, asset, or a licensing instrument? Arnab Das, global market strategist EMEA at Invesco, says they are mix of all of three.

You can buy, hold and use NFTs just like US dollars and Bitcoins. “They can appreciate in value and even produce cash flows.”

However, while money is fungible, NFTs are not. “One Bitcoin, dollar, euro or dirham is largely indistinguishable from the next. Nothing ties a dollar bill to a particular owner, for example. Nor does it tie you to to any goods, services or assets you bought with that currency. In contrast, NFTs confer specific ownership,” Mr Das says.

This makes NFTs closer to a piece of intellectual property such as a work of art or licence, as you can claim royalties or profit by exchanging it at a higher value later, Mr Das says. “They could provide a sustainable income stream.”

This income will depend on future demand and use, which makes NFTs difficult to value. “However, there is a credible use case for many forms of intellectual property, notably art, songs, videos,” Mr Das says.

South Africa's T20 squad

Duminy (c), Behardien, Dala, De Villiers, Hendricks, Jonker, Klaasen (wkt), Miller, Morris, Paterson, Phangiso, Phehlukwayo, Shamsi, Smuts.

UAE currency: the story behind the money in your pockets
The%20specs
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3E3.0%20twin-turbo%20inline%20six-cylinder%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3Eeight-speed%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E503hp%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E600Nm%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3Efrom%20Dh450%2C000%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3Enow%3C%2Fp%3E%0A