Change your passwords and PIN’s every month or so with Jesuit-like zeal. | BECK DIEFENBACH

TW
0

By Hugh Ash

AS in New Years gone by, I’m full of good intent, with a stack of resolutions to change my errant ways and be a better, healthier – and, if at all possible – wealthier person.
   In all likelihood, as in previous turns of the year, most will wither on the vine, a particularly apt expression in my case, since the vow to reduce plonk intake to a slurp or two only every other day is already a busted flush.
   However, there is one resolution I’ve already started and am resolved to keep up for safety’s sake and my own peace of mind.
   Admittedly, it’s a bit of a chore, but one I strongly advise anyone with a computer, smart phone, iPad, Tablet or any gizmo linking them to the internet should adopt, too: change your passwords and PIN numbers every month or so with Jesuit-like zeal.
   Because the ‘in’ crime of 2015 will be cyber-hacking. And it won’t just be the usual suspects – like Hollywood belle Jennifer Lawrence, Downton Abbey’s Jessica Brown Findlay, model Kate Upton or Olympic gymnast, McKayla Maroney, all of whom had raunchy, private photos snatched and given a public airing – who are in the hackers’ sights.
   Neither is it governments, who get hit by tens of thousands of hack attacks a day, nor global corporations, like Sony, recently forced to pull their movie, The Interview, after the North Koreans took umbrage at it spoofing their Glorious Young Leader, Jim Wrong-un, or whatever is his handle.
   Using the nom de cyber guerre, Guardians of Peace, their response was to filch 100 terabytes – 10 times the entire printed collection of the US Library of Congress – from Sony’s internet server and selectively release some of their haul.
   The raid near-crippled the studio, drew accusations amounting to ‘cowardice’ from President Obama – a man who knows a thing or two about leading from the back – and left company execs writhing with embarrassment (especially the producer who emailed his opinion that Angelina Jolie was a ‘minimally talented spoiled brat’). Sony’s shame was further compounded on Christmas Day when a bunch of cyber cowboys dubbing themselves the Lizard Squad blitzed the company’s PlayStation server – along with that of Microsoft’s Xbox – with so much junk they collapsed, denying millions of gamers the chance to play one another online.
   However, there’s nothing vaguely sinister about the bunch who skulk behind the image of a monocled reptile to play havoc with other people’s fun.
   Outed as unsophisticated, self-serving, publicity-grubbing kids, they’re sea scouts in the murky ocean of hacking piracy, but that’s what makes them especially dangerous.
   Because if little-league smart alecs like Lizard Squad can wreak such damage on mega- corporations, like Sony – thanks to the easy availability on online spyware – what chance does the average iPhone user or family with an internet modem stand?
   The problem is most naïve Web users don’t realise how vulnerable they make themselves by posting seemingly innocent messages on platforms like Facebook or Twitter, which reveal an awful lot about them and their lifestyles.
   Cyber pirates adore these social network sites, because they can ID people from photos on home pages and, if a date of birth is posted, there’s more than an odds-on chance it will be the golden key to a password or PIN (personal identification number) and a veritable treasure trove of secrets.
   So a word to the wise: if you’re thinking of taking a holiday which your online friends would love to know about, keep the info hush-hush until you return, because your friendly, neighbourhood cracksman would also be delighted to learn when your house is unoccupied.
   And who hasn’t slagged off their boss, spouse or partner in an email or accessed an X-rated site. It might be nobody’s business except your own, but if it’s tucked away safely on ‘the cloud’ – a mobile storage database that lets users access messages wherever they may roam –hackers with a passing interest in blackmail will be out to snaffle it.
   And, if you don’t think they can, just ask Miss Lawrence or Miss Brown Findlay what they think about this amazing on-the-hoof ‘app’, because apparently that’s from whence their saucily compromising photos were purloined.
   Another ‘app’ that should now carry a caveat is Snapchat, particularly popular with teens, because it allows them to send photos that are ostensibly automatically deleted after a few seconds.
   That sounds devilishly clever and failsafe, so how come 100,000 images from Snapchat users suddenly found their way into the public domain? Answers on a postcard please, not via email.
   Meanwhile, on the subject of email – and at the risk of sounding nerdy – if you log on line in a café using the establishment’s wi-fi, make sure its connection doesn’t start with ‘http’, but ‘https’, which is an encrypted and secure protocol.
   So, I hear you ask, how can I combat the menace of cybercrime?
   For a start you could carry out a basic ‘stocktake’ of your gizmos’ security, like refreshing you passwords and PINs.
   This glaring oversight was exposed in the Fleet Street phone-hacking scandal of 2011, when police were gobsmacked at the ease unscrupulous journos accessed mobile phone voice mail messages. All that was needed was the targets’ PINs and these transpired to be mostly untouched factory settings, like 0000 or 1111, and family birthdays.
   Ditto with internet accounts, which tend to be alpha-numeric – i.e. a mix of letters and numbers – so that ABC123DEF became one of the most popular codes in everyday use.
   What’s more, people will use the same one multiple times (go on, admit you do).
   On a lighter note, the probability of most folk falling victim to cyber pirates is low in the extreme. But ask yourself: would I go to bed with the house key in my outside front-door lock?
   Neither would I. And I’ll hold that thought, since it prompts me into changing my passwords and PINs regularly throughout 2015.
   If all do likewise we’ll have a happy, hacker-free New Year.
To read more of Hugh Ash’s comments, follow his award-winning online blog – Views From The Mallorca Pier – at hughash.wordpress.com