Deepak Daswani, cybersecurity expert: “They will attack us wherever there is technology and connectivity”
And it is not for less.We live in a world where the perception of insecurity in computer systems and on the Internet is greater than ever, and it seems that the thing will not improve.It is said that cybercrime moves more money than drug trafficking in the world.One day yes and another we also find news about massive leaks of information in large corporations that affect the personal data of millions of customers, or about the interference of governments and lobbyists in social networks that are able to guide the elections of democratic countries. Related
Not to mention more common attacks, but very widespread, such as the ransomware , which in a moment can leave us locked the computer and in the hands of a criminal who will ask us for a ransom for recover our hard drive.Wannacry, an attack of this kind that reached worldwide notoriety in the spring of 2017, was a turning point and made us all aware that anyone can be the victim.
Deepak Daswani is a young engineer from Tenerife who also wants to become a reference in the world of cybersecurity.Daswani has his own security services company and has collaborated in press, radio and television giving opinions and guidance to companies and individuals about how can they defend themselves in cyberspace.
Now, in addition, he has condensed that knowledge in a book, 'The threat hacker ', edited by Deusto.He analyzes in detail the risks to which we are exposed and explains how we can deal with them.The author, who breaks schemes and prefers the suit and tie to the t-shirts and hoodies that other colleagues have turned into his identity sign, also uses personal anecdotes to tell us about the uncertain world that we have had to live.
-A question to break the ice.If the hackers are the good ones, why is your book entitled 'The threat hacker' ?
It is a good question.In his day I gave many turns to the title, but my editor, Roger Domingo, who was the one who trusted this project since its inception, was clear that the best possible title was that of the threat hacker '.Because it is a title that impacts and comes to represent what much of society thinks about this issue.
Historically, the term "hacker" has been stigmatized by the great social mass and media, so there are still many people who continue to use it with negative connotation, making reference, without knowing it , to another totally different concept, that of the "cybercriminal".That is why we chose that title, and in my opinion I think it was a success because the book is having a great reception.
" hackers are people who have to be constantly up to date, work hard and study.We are quite normal people"
-It is said that the biggest gateway for the bad guys in the computer systems is the people, that due to ignorance or carelessness we give rise to data theft or fraud.It is the famous "human link." Could you give us some basic tips so that they do not deceive or rob us on the internet?
There are a number of tips that allow users to protect themselves from technical aspects such as vulnerabilities that can be used to compromise their devices, such as always updating the operating system to the latest version with all installed programs, or a prestigious commercial antivirus and proven reputation that is constantly updated with the signatures of the new malware .
Other councils are more geared towards protecting cybercriminal users who violate their security through social engineering, which is the art of manipulating people to do what we want them to do, that is, the art of engano, which when combined with technical elements can have a devastating impact.
To protect against such attacks, basically you have to use robust passwords that cannot be guessed in a simple way, modify them frequently, distrust the norm of any suspicious activity, contrast the information and do not follow links that come in emails.As well as controlling the information that we spread about ourselves in social networks and other channels on the network, which can give an attacker a lot of knowledge about our life, in order to prepare a path in which it is easier to fall.And of course, You should never download commercial payment programs 'cracked' from the Internet that may come with a gift.
-How are we in Spain in a matter of cybersecurity culture? Our impression is that we use many devices intensively, but we repair very little in aspects such as the threats to which we are exposed or the use of our personal data made by companies, social networks or governments.
In general, I think we are like in the rest of the countries.In terms of cybersecurity, users and companies are increasingly aware that there are a number of risks related to technology and that incidents often occur, if or yes.
We have been seeing news related to incidents of different types in generalist media for almost years, almost weekly, so that, on the one hand, almost nothing of what happens is strange, however, perhaps many users are not aware that all these incidents affect them and that they are exposed to certain threats simply by using a device and interacting with a number of services.
Many continue to believe that only large organizations or people of a certain level or status may be of interest to cybercriminals.On the other hand, the exploitation of data that can be exercised by technology giants and other actors is also an issue that is necessary to know, so that users make their own decisions regarding the level of privacy they want to adopt on the network.
"Many still think that only large organizations or people of a certain level or status may be of interest to cybercriminals"
-In your book you discard the idea that at some point we can be totally safe while surfing the internet or using technology.We are likely to be spied on and threatened by the bad, but also by the supposedly good, by the governments, the police, social networks or the internet provider that gives us a piece of virtual hard disk or a mailbox of email 'free'.Isn't it to be depressed?
This is how the digital society and the virtual world in which we live since the internet exists work.We cannot live completely safe because one hundred percent security does not exist.It does not exist for something as simple as all this wonderful technology that We use this made by humans, from a simple web page to the operating system of a mobile device.Everything is made by humans, and humans are constantly wrong.
There may be failures that become vulnerabilities in systems, devices, technologies or protocols, and from which no one had ever noticed, who had been there for years and that, suddenly, someone is able to identify. L or that today is sure tomorrow may not be.It's something we have to live with.
Anyway, we can do something to avoid much of the things that happen.Applying a whole set of security measures and good practices to which we always refer, and not just some, you can live with a level of Reliable security.So, answering your question, it's not to get depressed.Not at all.
"Once I analyzed the traffic that the neighbors generated in my Wi-Fi network and discovered things from their life, until I could identify them completely"
-What are the most effective attacks today for Cyber criminals when they put the average user in the spotlight?
As we have said before, the most effective thing for cybercriminals is the use of social engineering to deceive the user.The phishing attacks in which the user is sent to a user are still effective false login page that supplants the identity of an original website, such as that of your online banking portal , intranet, email or any social network.
The goal is for the user to enter their credentials and provide the cybercriminal with their account details.This is something that has been done since the beginning of the network, and that unfortunately remains the most effective technique to steal identities digital today.
Another attack scheme is the ransomware , which we have been seeing since 2013, despite the fact that many users or the great social mass noticed the existence of this term after the cyber attack WannaCry.Today, another technique that is being widely used by cybercriminals is cryptojacking , aimed at infecting websites in order to remotely use the equipment of the user who visits said website to undermine cryptocurrencies.
-In a world where connectivity is going to be multiplied by the popularization of the 5G standard or the technologies for IoT, what can we expect from cybercrime? In other words, where do you think they will attack us in the future?
We can expect all this to continue to evolve.Every time more connected devices that incorporate new functionalities are added to the market.Before a toothbrush or a refrigerator gave the service for which they were intended.Today, all these devices and many more that are part of the IoT have a host of functionalities through internet connection, and also interact with other services.
All these devices are likely to have vulnerabilities that can also open the door to attackers and compromise the rest of the equipment or systems of a domestic or corporate environment.So the answer to the question of where they are going to attack us is for any place where there is technology and connectivity.
"I'm going against the stereotype that says a hacker has to go with a t-shirt or hoodies instead of a suit"
-In the famous trilogy 'Millennium', by the Swedish novelist Stieg Larsson, the hacker Lisbeth Salander is the protagonist and is characterized as a young Gothic and punk, full of piercings and drunk.series 'Mr.Robot', the hacker protagonist is a very dark young man, who suffers from social anxiety and clinical depression.What do you think in general of the image that appears in the fiction of the world of hackers and cybercriminals? Don't you get the impression that there can't be normal people there?
We already know what the fiction world is like.The figure of the hacker has traditionally always been accompanied by a halo of darkness and mysticism.That is why obviously this kind of somewhat extravagant characters in fiction arouses more interest to the viewer.However, in reality, things are far from this image, especially as regards habits and health.
As in all environments there will be people of all kinds, but these features are not at all something common or a usual feature.In fact, we talk about people who have to be constantly up to date, work hard with our head, study and use all our mental faculties.We are quite normal people.Don't you think so? 😉.
You can't categorize people by stereotypes.In fact, you always speak both in the hacker community itself and in the sector to distinguish the hackers from the rest of professionals for wearing a t-shirt or hoodies instead of suits.
I go against this stereotype myself, because I have always liked to wear a suit and tie.Besides, I always accompany them with shirts with my initials embroidered on the cuffs and cufflinks.Maybe that's why anyone can think that I can't be a hacker .Chema Alonso is internationally known for his wool hat.At the end it is a matter of taste and everyone chooses his image, just like in any other world.But this has nothing to do with the technical knowledge or qualities that make a person a true hacker .They are independent things
-Have you ever been cheated or attacked on the Internet? What happened?
They try to deceive me every day, like all the users that we cohabit on the network.But, fortunately and for now, I have not had any serious incident.Well, once, a few years ago, some neighbors hacked the Wi-Fi network of My house, which I had set up on purpose insecurely because I was testing for attacks on wireless networks.As I was aware that something could happen, I monitored it daily and one day I noticed the presence of an intruder.
From there I decided to flee from pragmatic behavior (which would be to establish it as safe to tackle the problem) and I posed the challenge of trying to "hack the hacker ".From there a development story that I think that not even the best of the scriptwriters would have come up with.I was analyzing the traffic that the neighbors generated in my network and discovering things of their life, until I could identify them completely.
Post the story in his day on the blog of Chema Alonso and it was cover in 'Meneame'.It caused a lot of stir in social networks for some details that made it surreal.In case anyone has not read it yet, despite which dates from a few good years ago, I leave it here so as not to subtract emotion.Apart from this story in which in the end I turned the tortilla, I have not had any other problems.Hopefully not change that streak./p>
Images | Editorial Deusto
Comments
Post a Comment