Skip to main content

Deepak Daswani, cybersecurity expert: “They will attack us wherever there is technology and connectivity”

Deepak Daswani, cybersecurity expert: “They will attack us wherever there is technology and connectivity”

In the In the toughest years of the brick crisis, many approached the economy and economists to find out why the world was about to collapse.At that time, some economists became rich and famous by giving talks all over the world and writing books who collected their recipes to get out of the quagmire.Today it can be said that it is the computer hackers that have collected the economist's media glove.


And it is not for less.We live in a world where the perception of insecurity in computer systems and on the Internet is greater than ever, and it seems that the thing will not improve.It is said that cybercrime moves more money than drug trafficking in the world.One day yes and another we also find news about massive leaks of information in large corporations that affect the personal data of millions of customers, or about the interference of governments and lobbyists in social networks that are able to guide the elections of democratic countries. Related


Not to mention more common attacks, but very widespread, such as the ransomware , which in a moment can leave us locked the computer and in the hands of a criminal who will ask us for a ransom for recover our hard drive.Wannacry, an attack of this kind that reached worldwide notoriety in the spring of 2017, was a turning point and made us all aware that anyone can be the victim.


Deepak Daswani is a young engineer from Tenerife who also wants to become a reference in the world of cybersecurity.Daswani has his own security services company and has collaborated in press, radio and television giving opinions and guidance to companies and individuals about how can they defend themselves in cyberspace.


Now, in addition, he has condensed that knowledge in a book, 'The threat hacker ', edited by Deusto.He analyzes in detail the risks to which we are exposed and explains how we can deal with them.The author, who breaks schemes and prefers the suit and tie to the t-shirts and hoodies that other colleagues have turned into his identity sign, also uses personal anecdotes to tell us about the uncertain world that we have had to live.


-A question to break the ice.If the hackers are the good ones, why is your book entitled 'The threat hacker' ?


It is a good question.In his day I gave many turns to the title, but my editor, Roger Domingo, who was the one who trusted this project since its inception, was clear that the best possible title was that of the threat hacker '.Because it is a title that impacts and comes to represent what much of society thinks about this issue.


Historically, the term "hacker" has been stigmatized by the great social mass and media, so there are still many people who continue to use it with negative connotation, making reference, without knowing it , to another totally different concept, that of the "cybercriminal".That is why we chose that title, and in my opinion I think it was a success because the book is having a great reception.


Deepak Daswani, cybersecurity expert: “They will attack us wherever there is technology and connectivity”


" hackers are people who have to be constantly up to date, work hard and study.We are quite normal people"



-It is said that the biggest gateway for the bad guys in the computer systems is the people, that due to ignorance or carelessness we give rise to data theft or fraud.It is the famous "human link." Could you give us some basic tips so that they do not deceive or rob us on the internet?


There are a number of tips that allow users to protect themselves from technical aspects such as vulnerabilities that can be used to compromise their devices, such as always updating the operating system to the latest version with all installed programs, or a prestigious commercial antivirus and proven reputation that is constantly updated with the signatures of the new malware .


Other councils are more geared towards protecting cybercriminal users who violate their security through social engineering, which is the art of manipulating people to do what we want them to do, that is, the art of engano, which when combined with technical elements can have a devastating impact.


To protect against such attacks, basically you have to use robust passwords that cannot be guessed in a simple way, modify them frequently, distrust the norm of any suspicious activity, contrast the information and do not follow links that come in emails.As well as controlling the information that we spread about ourselves in social networks and other channels on the network, which can give an attacker a lot of knowledge about our life, in order to prepare a path in which it is easier to fall.And of course, You should never download commercial payment programs 'cracked' from the Internet that may come with a gift.


-How are we in Spain in a matter of cybersecurity culture? Our impression is that we use many devices intensively, but we repair very little in aspects such as the threats to which we are exposed or the use of our personal data made by companies, social networks or governments.


In general, I think we are like in the rest of the countries.In terms of cybersecurity, users and companies are increasingly aware that there are a number of risks related to technology and that incidents often occur, if or yes.


We have been seeing news related to incidents of different types in generalist media for almost years, almost weekly, so that, on the one hand, almost nothing of what happens is strange, however, perhaps many users are not aware that all these incidents affect them and that they are exposed to certain threats simply by using a device and interacting with a number of services.


Many continue to believe that only large organizations or people of a certain level or status may be of interest to cybercriminals.On the other hand, the exploitation of data that can be exercised by technology giants and other actors is also an issue that is necessary to know, so that users make their own decisions regarding the level of privacy they want to adopt on the network.



"Many still think that only large organizations or people of a certain level or status may be of interest to cybercriminals"



-In your book you discard the idea that at some point we can be totally safe while surfing the internet or using technology.We are likely to be spied on and threatened by the bad, but also by the supposedly good, by the governments, the police, social networks or the internet provider that gives us a piece of virtual hard disk or a mailbox of email 'free'.Isn't it to be depressed?


This is how the digital society and the virtual world in which we live since the internet exists work.We cannot live completely safe because one hundred percent security does not exist.It does not exist for something as simple as all this wonderful technology that We use this made by humans, from a simple web page to the operating system of a mobile device.Everything is made by humans, and humans are constantly wrong.


There may be failures that become vulnerabilities in systems, devices, technologies or protocols, and from which no one had ever noticed, who had been there for years and that, suddenly, someone is able to identify. L or that today is sure tomorrow may not be.It's something we have to live with.


Anyway, we can do something to avoid much of the things that happen.Applying a whole set of security measures and good practices to which we always refer, and not just some, you can live with a level of Reliable security.So, answering your question, it's not to get depressed.Not at all.



"Once I analyzed the traffic that the neighbors generated in my Wi-Fi network and discovered things from their life, until I could identify them completely"



-What are the most effective attacks today for Cyber ​​criminals when they put the average user in the spotlight?


As we have said before, the most effective thing for cybercriminals is the use of social engineering to deceive the user.The phishing attacks in which the user is sent to a user are still effective false login page that supplants the identity of an original website, such as that of your online banking portal , intranet, email or any social network.


The goal is for the user to enter their credentials and provide the cybercriminal with their account details.This is something that has been done since the beginning of the network, and that unfortunately remains the most effective technique to steal identities digital today.


Another attack scheme is the ransomware , which we have been seeing since 2013, despite the fact that many users or the great social mass noticed the existence of this term after the cyber attack WannaCry.Today, another technique that is being widely used by cybercriminals is cryptojacking , aimed at infecting websites in order to remotely use the equipment of the user who visits said website to undermine cryptocurrencies.


-In a world where connectivity is going to be multiplied by the popularization of the 5G standard or the technologies for IoT, what can we expect from cybercrime? In other words, where do you think they will attack us in the future?


We can expect all this to continue to evolve.Every time more connected devices that incorporate new functionalities are added to the market.Before a toothbrush or a refrigerator gave the service for which they were intended.Today, all these devices and many more that are part of the IoT have a host of functionalities through internet connection, and also interact with other services.


All these devices are likely to have vulnerabilities that can also open the door to attackers and compromise the rest of the equipment or systems of a domestic or corporate environment.So the answer to the question of where they are going to attack us is for any place where there is technology and connectivity.


Deepak Daswani, cybersecurity expert: “They will attack us wherever there is technology and connectivity”



"I'm going against the stereotype that says a hacker has to go with a t-shirt or hoodies instead of a suit"



-In the famous trilogy 'Millennium', by the Swedish novelist Stieg Larsson, the hacker Lisbeth Salander is the protagonist and is characterized as a young Gothic and punk, full of piercings and drunk.series 'Mr.Robot', the hacker protagonist is a very dark young man, who suffers from social anxiety and clinical depression.What do you think in general of the image that appears in the fiction of the world of hackers and cybercriminals? Don't you get the impression that there can't be normal people there?


We already know what the fiction world is like.The figure of the hacker has traditionally always been accompanied by a halo of darkness and mysticism.That is why obviously this kind of somewhat extravagant characters in fiction arouses more interest to the viewer.However, in reality, things are far from this image, especially as regards habits and health.


As in all environments there will be people of all kinds, but these features are not at all something common or a usual feature.In fact, we talk about people who have to be constantly up to date, work hard with our head, study and use all our mental faculties.We are quite normal people.Don't you think so? 😉.


You can't categorize people by stereotypes.In fact, you always speak both in the hacker community itself and in the sector to distinguish the hackers from the rest of professionals for wearing a t-shirt or hoodies instead of suits.


I go against this stereotype myself, because I have always liked to wear a suit and tie.Besides, I always accompany them with shirts with my initials embroidered on the cuffs and cufflinks.Maybe that's why anyone can think that I can't be a hacker .Chema Alonso is internationally known for his wool hat.At the end it is a matter of taste and everyone chooses his image, just like in any other world.But this has nothing to do with the technical knowledge or qualities that make a person a true hacker .They are independent things


-Have you ever been cheated or attacked on the Internet? What happened?


They try to deceive me every day, like all the users that we cohabit on the network.But, fortunately and for now, I have not had any serious incident.Well, once, a few years ago, some neighbors hacked the Wi-Fi network of My house, which I had set up on purpose insecurely because I was testing for attacks on wireless networks.As I was aware that something could happen, I monitored it daily and one day I noticed the presence of an intruder.


From there I decided to flee from pragmatic behavior (which would be to establish it as safe to tackle the problem) and I posed the challenge of trying to "hack the hacker ".From there a development story that I think that not even the best of the scriptwriters would have come up with.I was analyzing the traffic that the neighbors generated in my network and discovering things of their life, until I could identify them completely.


Post the story in his day on the blog of Chema Alonso and it was cover in 'Meneame'.It caused a lot of stir in social networks for some details that made it surreal.In case anyone has not read it yet, despite which dates from a few good years ago, I leave it here so as not to subtract emotion.Apart from this story in which in the end I turned the tortilla, I have not had any other problems.Hopefully not change that streak./p>

Images | Editorial Deusto

Comments

Popular posts from this blog

Internet of plants: a tomato knows as much about networks as you

The possibility of plant species communicating through complex networks, what some scientists have called the internet of plants , is an issue that has been discussed for a long time, at least 20 years.It was in 1997 when the scientist Suzanne Simard , from the University of British Columbia in Vancouver (Canada), published a study in the journal Nature on how Forest plants use complex systems where species exchange nutrients, send warning signals and relate to the environment. Although there is no scientific consensus, several investigations seem to support this hypothesis.If confirmed, as we read in a fascinating report by the Sinc Agency, the forests would act as huge structures that are articulated under the soil through a network in which factors invisible to the human eye interact and can determine the future of the climate.Understanding how it works is the challenge that even science faces. internet of plants and the wisdom of forests The premise of Suzanne Simard ...

New setbacks for conspiranoicos: radiofrequencies do not affect health

New evidence published by the Scientific Advisory Committee on Radio Frequency and Health (CCARS) in its 2016 Radio Frequency and Health Report indicates that there are no adverse health effects derived of exposure to radio frequencies emitted by mobile phone antennas or radio and television broadcasting.No evidence has been found on the danger in wireless systems (Wi-Fi) or airport scanners. The new 2016 Radio Frequency and Health Report collects, updates and analyzes the scientific evidence on the subject for the period between January 2013 and June 2016. radio frequencies are not dangerous According to the conclusions of the report " the critical analysis of the evidence supports that there are no technical or sanitary reasons that justify the arbitrary and discretionary imposition of more demanding exposure limits than those recommended by WHO-ICNIRP and the Union European ", while the application of more restrictive limits" would imply increasing the n...

GIF history: where they come from and where they are going

Funny, witty, curious... GIFs have already become a regular resource in social networks and messaging applications and have become part of our daily lives and jokes.It is an image format that has evolved significantly throughout its history and is experiencing a new awakening. In fact, to find its origins, we must go back more than twenty years ago .A moment in which they had little to do with what we know today and an evolution that we could not stop review.So let's find out where they come from and try to catch a glimpse of where they are going. What is a GIF The word GIF responds to the acronym of Graphics Interchange Format , or what is the same, graphic exchange format.A term for the graphic format used in the network for both static images and animations.In more concrete terms, it supports 8 bits per pixel and allows you to display images with up to 256 colors simultaneously-limited by a palette of 16 million-. This particularity makes it a perfect ally of infogr...

Amazon Prime Video arrives in Spain: this is all you need to know

That during the last years there has been a change in the way we enjoy audiovisual content is an obvious reality, as reflected by the huge popularity of streaming services like Netflix and the like.A context in which new competitors are constantly added and that, after the landing of this company in our country just over a year ago, is in full transformation. In fact, today we have learned of the incursion of a new protagonist in this area.Yes, because Amazon Prime Video has just arrived in Spain .A landing that takes place only two weeks away that of HBO, which culminates in a 2016 sown of changes.But, what exactly does it consist of? What advantages and disadvantages does it have compared to the "of its kind"? WHAT AMAZON PRIME VIDEO OFFERS The type, quality and quantity of movies and series offered by the service will be key when determining your success.A catalog a priori smaller than that of HBO and Netflix, but in which we find titles like Seinfield , Into...

What we know and what we suspect in the new Facebook algorithm change

"In my time, we read the newspaper in Facebook ".By 2020, nostalgia has taken over billions of people.In its memory, 2018, when Facebook stopped being Facebook to become Facebook again.Paraiso of engagement for brands and media, land paid for clickbaits and fake news, the social network of Mark Zuckerberg has given a rudder to his algorithm. He wants to return to his origins .And this is what will happen. Related If something goes well, to change it.40.653 million dollars entered in 2017.More than 2.100 million active users per month, a quarter of the world's population.But Zuckerberg is not one of those, of which they are.Want a Facebook with more social connections between people and less presence of brands and media .And what do your users want? Nearly two-thirds of American adults consume news on social networks.More than half do so on their Facebook walls.Pew Research Center data points to a clear trend: Facebook is becoming a media platform.54% of Facebook u...

No kidding: selfitis exists and can be a problem

Sometimes one thinks that social networks were created to share photos of faces putting on little bones and images of dishes overflowing with appetizing foods or, better, of faces putting little bones in front of plates overflowing with appetizing foods in the same shot.is to see faces, faces, faces...all of them smiling, as if looking at the smartphone mirror was the height of happiness.And it does not seem that there are so many beautiful and happy people, or maybe yes, that you go Namely.What envy. Well, what we're going to do: Janarthanan Balakrishnan psychologists from the Thiagarajar School of Management in India; and Mark D.Griffiths, of the Nottingham Trent University, in the United Kingdom, have published an article in the International Journal of Mental Health and Addiction entitled 'A study on' Selfitis', which names this mania of going around the world taking pictures of oneself, as if beyond our curls the world had been destroyed by that meteorite th...

Twitter shows the best of ourselves (it wasn't always going to be the worst)

In the era of social networks, accustomed to interact daily with Facebook, Twitter, Instagram, Google or WhatsApp, we forget that these tools are phenomenal in the History of Humanity capable of mobilize hundreds of thousands of people in very different geographical locations in a matter of hours or even minutes. Already in the past, Twitter has asserted its more social dimension to mobilize people, companies or organizations and also, from a broader perspective, feelings of solidarity and support or also of rejection and repulses towards causes with an important mediatic impact.Recently, Twitter was once again the engine of solidarity after Dortmund's explosions as the Borussia Dortmund team bus passed on its way to the local stadium on the occasion of the Champions League match between the Borussia and the Monaco. These explosions did not have the devastating effect that they could have caused , so that everything remained in a major social commotion at international lev...

Most apps for children violate your privacy

Do you know if apps with which children enjoy their safety? A team of researchers from the International Computer Science Institute (ICSI) of the University of Berkeley has studied compliance with the Online Privacy Protection Act (COPPA) in these mobile applications for the little ones, through a scalable dynamic analysis that allows the automatic evaluation of privacy behaviors of Android apps. After studying 5,855 applications aimed at children, the research concludes that most of these apps, 57%, violate the privacy of their users mainly due to the use of data by third parties. apps for children and privacy Although many apps offer options in their configuration to respect the federal law that protects minors in the United States, by disabling tracking, their results suggest that a majority of applications either do not use these options or propagate them in wrong way. In addition, researchers believe that 19% of apps for children send user IDs to third parties to show ...

Are social networks damaging democracy?

The revelations according to which Russian agents inserted ads on Facebook that tried to influence the 2016 US elections raise a disturbing question: is Facebook bad for democracy? As an expert in the social and political repercussions of technology, I think that the problem is not exclusively from Facebook, but that it is much broader: Social networks are weakening some of the conditions that have historically enabled the existence of national states democratic. I understand that it is a dramatic statement, and I do not expect anyone to believe it immediately, but considering that almost half of all potential voters received false news promoted by the Russians in Facebook is an argument that must be debated. Associate Professor of Philosophy, Director of Center for Professional and Applied Ethics, University of North Carolina-Charlotte How we create a shared reality Let's start with two concepts: the "imagined community" and the "bubble filter". ...

This is how visual challenges star in some of the most viral content

Constantly, we all receive in our mail, our WhatsApp or our Facebook account, games that try to test our ingenuity, imagination or visual skill.There are a thousand types, more fun or darker.But they have one thing in common: we cannot avoid trying them and see if we are able to solve them .This is how the visual challenges star in some of the most viral content of the network. Visual challenges, why are we crazy? The visual challenges are games.So, they attend to this playful and fun part that people have no choice but to feed from time to time.They are pure and hard entertainment, with no more pretensions, and that desire to Having fun represents one of the main features that are sought when surfing the Internet . Another of the qualities for which they succeed is because they challenge the mind directly.Human beings love that feeling of feeling a little troubled, somewhat lost, but convinced that there is a solution to that enigma to which, sooner or later, it will come.Rathe...