Support 110 years of independent journalism.

  1. World
3 October 2012

The source of cyber crime: our own complacency

We should all know better.

By Alex Ward

The figures are staggering: Almost 20 million items of personal data, such as bank details and passwords, were traded illegally over the internet in the first half of this year, according to the FT.

This number is expected to have risen four-fold since 2010, as the rising number of internet users has run parallel to a dramatic rise in the proficiency of cyber–criminals.

However, these trends belie the root cause of the problem: our own complacency. Too many of us categorically fail to understand the new threats that come with the information age. The blame lies squarely with us.

One all-too-common mistake was highlighted in a recent post on Buzzfeed. The article told the story of Twitter user Daniel Dennis Jones (@blanket at the time), a multimedia producer who lost his twitter account – along with its unique username – to hackers.

Buzzfeed blamed a Twitter security flaw, which allows an endless number of login attempts so long as they come from different IP addresses. The hacker had simply set up an automated program that repeatedly attempted to log in from various different IPs using common passwords.

Select and enter your email address Your weekly guide to the best writing on ideas, politics, books and culture every Saturday - from the New Statesman. The New Statesman's quick and essential guide to the news and politics of the day. Stay up to date with NS events, subscription offers & updates. Weekly analysis of the shift to a new economy from the New Statesman's Spotlight on Policy team.
  • Administration / Office
  • Arts and Culture
  • Board Member
  • Business / Corporate Services
  • Client / Customer Services
  • Communications
  • Construction, Works, Engineering
  • Education, Curriculum and Teaching
  • Environment, Conservation and NRM
  • Facility / Grounds Management and Maintenance
  • Finance Management
  • Health - Medical and Nursing Management
  • HR, Training and Organisational Development
  • Information and Communications Technology
  • Information Services, Statistics, Records, Archives
  • Infrastructure Management - Transport, Utilities
  • Legal Officers and Practitioners
  • Librarians and Library Management
  • Management
  • Marketing
  • OH&S, Risk Management
  • Operations Management
  • Planning, Policy, Strategy
  • Printing, Design, Publishing, Web
  • Projects, Programs and Advisors
  • Property, Assets and Fleet Management
  • Public Relations and Media
  • Purchasing and Procurement
  • Quality Management
  • Science and Technical Research and Development
  • Security and Law Enforcement
  • Service Delivery
  • Sport and Recreation
  • Travel, Accommodation, Tourism
  • Wellbeing, Community / Social Services
Visit our privacy Policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications.
THANK YOU

However, this attack couldn’t have happened without the weakness of Daniel’s password, since it appeared on the hacker’s “common passwords” list. Elementary.

Content from our partners
How thriving cities can unlock UK productivity – with PwC
How the next government can build on the UK’s strength in services exports
What is the point of inheritance tax?

This sort of naivety extends far beyond simple password settings; the smartphone is the newly evolving battleground for cyber-security.

More than half of all adults own one, with 120,000 of them stolen each year. It doesn’t take a genius to figure out, given the number of thefts, that more and more of us are increasingly at risk of falling victim to ID theft and cybercrime.

To make matters worse, a study by security awareness organisation Knowthenet showed that an estimated 38 per cent of us keep key personal data such as online banking details and various passwords on our smartphones, rendering us mere sitting ducks in the event that it goes missing.

The report also revealed that 19 per cent of smartphone owners routinely use unencrypted WiFi, which exposes the user to sniffing attacks, whereby hackers can steal your information without even touching your phone.

So the next time you become the prey of tech-savvy trolls or internet gangsters, don’t blame the system. Blame yourself – because it was probably your fault.