New Times,
New Thinking.

  1. World
3 October 2012

The source of cyber crime: our own complacency

We should all know better.

By Alex Ward

The figures are staggering: Almost 20 million items of personal data, such as bank details and passwords, were traded illegally over the internet in the first half of this year, according to the FT.

This number is expected to have risen four-fold since 2010, as the rising number of internet users has run parallel to a dramatic rise in the proficiency of cyber–criminals.

However, these trends belie the root cause of the problem: our own complacency. Too many of us categorically fail to understand the new threats that come with the information age. The blame lies squarely with us.

One all-too-common mistake was highlighted in a recent post on Buzzfeed. The article told the story of Twitter user Daniel Dennis Jones (@blanket at the time), a multimedia producer who lost his twitter account – along with its unique username – to hackers.

Buzzfeed blamed a Twitter security flaw, which allows an endless number of login attempts so long as they come from different IP addresses. The hacker had simply set up an automated program that repeatedly attempted to log in from various different IPs using common passwords.

Select and enter your email address Your weekly guide to the best writing on ideas, politics, books and culture every Saturday. The best way to sign up for The Saturday Read is via saturdayread.substack.com The New Statesman's quick and essential guide to the news and politics of the day. The best way to sign up for Morning Call is via morningcall.substack.com
  • Administration / Office
  • Arts and Culture
  • Board Member
  • Business / Corporate Services
  • Client / Customer Services
  • Communications
  • Construction, Works, Engineering
  • Education, Curriculum and Teaching
  • Environment, Conservation and NRM
  • Facility / Grounds Management and Maintenance
  • Finance Management
  • Health - Medical and Nursing Management
  • HR, Training and Organisational Development
  • Information and Communications Technology
  • Information Services, Statistics, Records, Archives
  • Infrastructure Management - Transport, Utilities
  • Legal Officers and Practitioners
  • Librarians and Library Management
  • Management
  • Marketing
  • OH&S, Risk Management
  • Operations Management
  • Planning, Policy, Strategy
  • Printing, Design, Publishing, Web
  • Projects, Programs and Advisors
  • Property, Assets and Fleet Management
  • Public Relations and Media
  • Purchasing and Procurement
  • Quality Management
  • Science and Technical Research and Development
  • Security and Law Enforcement
  • Service Delivery
  • Sport and Recreation
  • Travel, Accommodation, Tourism
  • Wellbeing, Community / Social Services
Visit our privacy Policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications.
THANK YOU

However, this attack couldn’t have happened without the weakness of Daniel’s password, since it appeared on the hacker’s “common passwords” list. Elementary.

This sort of naivety extends far beyond simple password settings; the smartphone is the newly evolving battleground for cyber-security.

More than half of all adults own one, with 120,000 of them stolen each year. It doesn’t take a genius to figure out, given the number of thefts, that more and more of us are increasingly at risk of falling victim to ID theft and cybercrime.

To make matters worse, a study by security awareness organisation Knowthenet showed that an estimated 38 per cent of us keep key personal data such as online banking details and various passwords on our smartphones, rendering us mere sitting ducks in the event that it goes missing.

The report also revealed that 19 per cent of smartphone owners routinely use unencrypted WiFi, which exposes the user to sniffing attacks, whereby hackers can steal your information without even touching your phone.

So the next time you become the prey of tech-savvy trolls or internet gangsters, don’t blame the system. Blame yourself – because it was probably your fault.

Content from our partners
An innovative approach to regional equity
ADHD in the criminal justice system: a case for change – with Takeda
The power of place in tackling climate change