Skip to content
Cyber Law Studies & Security
Menu
  • Home
  • Cyber Learning
  • Cyber Hygiene
  • Cyber Security
  • Cyber Attacks
Menu
Covid Warrior against Cyber Hackers

Be a Cyber Warrior in COVID-19 times !

Posted on August 24, 2020September 5, 2020 by admin

The impact of the Novel Corona Virus, renamed as COVID-19, on economies and business houses all over the world is immeasurable. And the affects of such impact would last for quite some years. Scientists all over the worlds are spending huge amount of time on research and studies to develop a cure and medicine, and leaders are discussing about how they can balance the economy and the living. In spite of the fact, that, today’s world is driven by technology and innovations, which were unimaginable over last few years, we were never prepared for such a massive impact. But, we live with hope and anticipation, we look forward to flatten the curve and see a descent in fatality and oblige back to the normal way of life, perhaps “the new normal” as we would call it.

Physical Distancing has become more important than having meetings with clients in person, and hence the use of virtual communication services or online meeting software’s, are now more vital. Overnight, the demand for digital infrastructure has skyrocketed.

Staying Connected:
Many companies have introduced and upgraded their virtual meeting services to provide quality experience to its consumers. Most of them are reliable enough as well, however there are some apps and software’s that constantly collect the consumer data for further development f their platforms and consumer behaviour. While most do it in the legit way, some collect data and possibly save it to push across to their marketing teams for sales. Few of these violate the privacy clause and may intrude into your personal data which ideally should never be shared. Thus, it becomes very important for you, as a user, to understand whether you need to use a particular app or software or a web application, to share your sensitive data of personal or business. Most data thefts are done using man-in-the-middle attacks manipulating the communication channels you use. Permissions given by you to alter or allow your personal space on your device is another way you welcome someone to use (or misuse) your private space.

Here is what you should consider when you are intending to get yourself online:

  • Never Download Software from unknown unsecured links. Never download APK files (apps) from any other source than the regular platforms. If the source says, its free, it’s more of a reason to say no to it. (TIP: Look out for the ‘s’ in https:// to know that you are on a secured website.)
  • Never believe on reviews only to opt for a purchase of software online, many a times, and the reviews are paid and purposely used to lure you to purchase the deal.
  • Never connect yourself to Free Wi-Fi available at public places, they are traps for you to connect and collect the data packets to-and-from your device.
  • When you are not using your device, especially the laptops, disconnect them from the internet you are connected. There are malicious software or malwares that can run in the background and export your sensitive data when your machine is on standby but connected to the web. (TIP: Put a tape, yes a tape on your camera of the laptop. Covering a computer’s camera doesn’t protect the device from being hacked, but it does prevent a hacker from being able to see whatever the camera sees.)
  • Never click on unknown links, open documents and even photos which are not intended to be sent to you, they may have auto-activated scripts that may auto-install and collect your important data.
  • Never share your username & passwords / verification codes and OTPs to anyone on the web. Even if you know them. One of the common cyber cases reported are about Zoom Bombing, where the unsecured virtual meetings were attended by uninvited guests with the sole intention to disrupt the entire meeting. (TIP: Share Username though one medium, and share password through another source).

Being a Paying Prey:

Scammers and Cyber Hackers are ‘anonymous’ and it’s difficult to trace them and largely said, it’s literally impossible to pin point their exact location. Cyber Investigation Agencies are investing lots of time and efforts to learn and understand their behaviour patterns, and there is a surprise element at each level. Another research shows that the scammers and cyber hackers work in a pro-logic method series to stay a step ahead in their plan when running a particular scamming campaign and the target is usually a person or a community that’s stranded for a cause. This shows that there is a huge amount of research and tracking done by the scammers of their target audience to execute their game-plan successfully. Covid19 Pandemic time is one such era where the scammers are taking a great advantage.

Here is something you should know:

Being a Paying Prey:

Scammers and Cyber Hackers are ‘anonymous’ and it’s difficult to trace them and largely said, it’s literally impossible to pin point their exact location. Cyber Investigation Agencies are investing lots of time and efforts to learn and understand their behaviour patterns, and there is a surprise element at each level. Another research shows that the scammers and cyber hackers work in a pro-logic method series to stay a step ahead in their plan when running a particular scamming campaign and the target is usually a person or a community that’s stranded for a cause. This shows that there is a huge amount of research and tracking done by the scammers of their target audience to execute their game-plan successfully. Covid19 Pandemic time is one such era where the scammers are taking a great advantage.

Here is something you should know:

  • Curiosity may want you to click on the links which provide information about Covid19 pandemic, donations and even cure for the disease, but it may not be the right choice. Clicking on links which are suspicious may result in scammers taking control of your device and important information. Make a habit to rely on information provided by authorised sources only. Stop forwarding / circulating fake information, verify the content yourself and forward only if it’s necessary.
  • Never respond back to emails & messages, from unknown sources, which say you have been selected for some benefit, won a lottery, or prize, or inheritance money or similar. You may end up paying them. These are most common type of scammers, and they send mails to leaked email ids from key organisations and their database. (TIP: Add a Filter to your inbox to identify spam mails. Usually the sending email id and the sender name are different in these emails. Remember, reputed organisations won’t send you an email from random email ids, they would rather have someone visit you personally if you are supposed to receive such a massive amount of money.)
  • Someone claiming they know your password and asking ransom in crypto-currencies is another such common scam mail.  If you receive such email, first thing is to change your password to something which is “stronger” or use Dual Factor Authentication.
  • Do not Confuse Pay Now & Receive Now option in App payment options: Some scammers are sweet talkers and try to close deals over the phone, so they send you the link claiming it’s to Pay you, but the link actually is to Pay ‘them’. Be careful. (TIP : Avoid making payments over the call, just request them to send their bank details and you could transfer the money to their account through NEFT if it’s really required to be.
  • Do not save your passwords for banking related transactions and logins on your devices. Avoid using “Save Password” feature for Apps and Websites.
  • Never share your Personal Details to anyone over the phone or emails.  Few details are required to forward your calls and text messages to another phone. Few confirmations are required to change your important passwords.
  • If you ever receive an email from a friend who is asking you to transfer some funds, do re-verify with them over a call or by meeting them person. Your friends email id could have been hacked and the bank details may be not the right ones.
  • Avoid updating minute-by-minute posts on social media about yourself, loved ones and your family; scammers use this information for target profiling for attacks on you for future.

[ This article was also published in the BNI GOA Region- Newsletter for the month of July 2020 to provide awareness amongst businessmen and entrepreneur fraternity in Goa. ]

[contact-form-7 404 "Not Found"]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Comments

    Archives

    • August 2023
    • August 2020
    • April 2020
    • March 2020
    • September 2019

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Get in Touch with us !

    Categories

    • Cyber Hygiene
    • Cyber Learning
    • Online Communication
    • Online Transactions
    • Web Vulnerabilities

    RSS Worldwide Cyber Case Studies

    • Mid-year state of cyber security: APAC
    • Outpacing Compliance, Realizing Risk Management & Achieving Forward Posture&nbsp...
    • SaaS Security Survey Report 2022
    • We want to hear your views on the state of cyber security today
    • CS Hub launches 20 cybersecurity leaders to watch

    Recent Posts

    • Data Privacy Trauma – How Should We Handle It
    • Cyber Crimes – Emerging Trends Ahead
    • Be a Cyber Warrior in COVID-19 times !
    • How LARGE is Cyber Threat !

    RSS CyberLaw Podcasts

    ©2026 Cyber Law Studies & Security | Built using WordPress and Responsive Blogily theme by Superb