how to protect yourself from these cyber attacks

how to protect yourself from these cyber attacks
how to protect yourself from these cyber attacks

The ‘cyberthieves‘they constantly modernize their techniques to steal data. Not protecting the chip that dogs must carry to identify them and return them to their owners in case they get lost, neglecting car controls or home automation devices or connecting to false Wi-Fi networks to avoid spending the phone’s internet rate cell phone can be very dangerous.

Cyberthieves find it easier than you might think to get hold of what their victims want most: his dog, his car, his house and his money. With a small investment and their knowledge, these criminals can initiate cyberattacks that would end up with the data of those who do not worry about protecting themselves in their possession. “There has been no investment in reinforcing the security of digitalization,” he says. Juan Miguel Velasco, CEO of Aiuken Cybersecurity.

This multinational, which works with large companies, “with the entire Ibex and internationally,” details its CEO, to defend them against thefts such as those recently suffered by Telefónica or Santander suppliers, has prepared a guide of recommendations to have on hand. the tools to act in a case of these characteristics.

smart home devices

Remote access to home automation systems, made up of devices such as assistants (Alexa, Google Assistant, Siri and Cortana), screens, smart plugs and thermostats, multi-room audio systems or security cameras, allows you to control the devices in a home through an internet network. These new technologies have revolutionized the way each family interacts with their home.

However, there are certain security risks to consider, which must be carefully managed to prevent unauthorized access and potential abuse. “Enough with leave a car near the houseup to 50 meters, to catch the Wi-Fi network used by these devices,” says the CEO of Aiuken.

To do this, this company recommends using multi-factor authentication (MFA) to add an extra layer of security beyond the simple password. For their part, the passwords themselves must be “secure and unique,” the company says.

They also advise keeping device firmware and software up to date, using secure networks, preferably with encryption and password protection, to connect home devices, and educating users about security risks and best practices for managing devices. smart and remote access.

dog chip

The RFID Radio Frequency Identification microdevices that are implanted in dogs with their owners’ data are susceptible to being ‘hacked’. These devices contain a unique number that is assigned to each animal, to which a base is associated with notes about Who owns it, where does it live and what is its phone number.

“That the dog is located, identified in case it gets lost and that brings us back to what we always have, that those who have designed the chips for pets have not taken anything into account in terms of security and anyone with a reader can access the entire information. If someone passes their hand over your dog and carries this reader, they already know where you live,” warns the owner of Aiuken Cybersecurity.

To prevent cyberthieves -“anyone with money to pay for a reader of less than 20 euros“, says Velasco – obtain data from the chip, it is important to ensure that personal data access and handling practices follow local and international data protection laws.

Organizations that maintain databases must implement robust security measures to protect against unauthorized access. It is important to educate about the risks and rights related to identification using RFID chips in pets. Velasco considers that these devices “should have more security so that only the veterinarian or the Police could unlock them.”

car control

Vehicle theft through hacking Key fob control is a technique for which you do not even need to have the physical key. In fact, this practice takes advantage of vulnerabilities in keyless entry systems that many current vehicles use and that allow the driver to open and start the vehicle without having to insert it.

However, “the remote control has to be a little close when they open it. Just go to a parking lot and be with the control nearby of the people who are going to open it,” explains Velasco. The device so that thieves can open the car works just like a “control copier.”

To prevent vehicle theft, the company encourages using signal blocking cases to store key fobs, especially at home. Are covers are designed to block RFID signals (Radio Frequency Identification), and thus prevent them from being captured and amplified by external devices.

Parking in secure, well-lit areas and installing additional anti-theft devices such as alarms, immobilizers, or GPS trackers can help deter thieves or help recover the vehicle if it is stolen. In the same way that the ‘software’ is updated of cell phones, we would have to do the same with the car.

fake wifi network

From Aiuken Cybersecurity they assure that creating a fake Wi-Fi access point is a technique commonly used in ‘Man-in-the-Middle’ (MitM) attacks. The cybercriminals establish a WiFi hotspot that looks legitimate to trick victims and have them connect to it. In this way, once they have connected, the attacker can intercept the communication, steal personal data and access credentials.

Detecting them is practically impossible. “I never connect to Wi-Fi outside my home or office, because I am not able to recognize which ones are false“says Juan Miguel Velasco. A captive portal is often added, which is a web page that is automatically shown to new users before they are allowed to access the Internet normally. “It is very easy to set up a network and This one is invisible.”

This cybersecurity company recommends checking the SSID (the public name that identifies a network) and making sure that the name of the Wi-Fi network is as expected, especially in public places. They consider it advisable to use a Virtual Private Network (VPN) to encrypt network traffic and protect personal information.

 
For Latest Updates Follow us on Google News
 

-

PREV Nvidia Stock Down After 10-for-1 Stock Split By Investing.com
NEXT Airbus Transport International receives its last BelugaXL, closing a cycle