{"id":7753,"date":"2017-02-23T13:20:00","date_gmt":"2017-02-23T13:20:00","guid":{"rendered":"https:\/\/www.centsys.co.za\/will-2017-be-the-year-of-the-hacker\/"},"modified":"2017-02-23T13:20:00","modified_gmt":"2017-02-23T13:20:00","slug":"will-2017-be-the-year-of-the-hacker","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/","title":{"rendered":"Will 2017 be the Year of the Hacker?"},"content":{"rendered":"<p>Today\u2019s criminal is a completely different breed.<\/p>\n<p>Tech-savvy, sly, and immeasurably<b> resourceful<\/b>. He is able to adapt with ease to the <b>forever-changing technological landscape<\/b>, and use even the slightest weakness to his advantage. His tools are not crowbars and screwdrivers, but a<b> mouse<\/b>, <b>keyboard<\/b> and <b>Internet connection<\/b>. This newly-constructed reality has the distinct flavour of <b>technological determinism<\/b>: the branch of social science that has as its main tenet the belief that <b>all human behavior and culture are influenced by innovations and developments in technology<\/b>.<br \/>\n<a style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/02\/CENTURION-TIPS.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/02\/CENTURION-TIPS-300x157.jpg\" width=\"400\" height=\"207\" border=\"0\" \/><\/a><br \/>\nThe impact that so-called <b>ICTs<\/b> (information and communications technologies) has made on our lives cannot be overstated, and developments such as Internet banking and apps have made long queues and frustrating face-to-face interactions things of the past. \u00a0Brick and mortar are being replaced by ones and zeros, and no one is complaining. The Dutch media and communications academic <b>Van Poecke<\/b> draws a clear distinction between modern and postmodern society, positing that in the former technology was in service of man, while in the latter <b>man is subordinate to technology<\/b>. He underlines this position by stating that, while in modern society there was a clear dividing line between technology and culture, in a postmodern society such as ours <b>technology <i>is<\/i> the culture<\/b>.<\/p>\n<p>But, with this dramatic shift in the overall consumer experience, come <b>myriad new threats to security<\/b>, <b>privacy<\/b> and the<b> integrity of information<\/b>. Not even the biggest, most powerful financial institutions are immune, as evidenced by a recent <a href=\"http:\/\/www.webopedia.com\/TERM\/P\/phishing.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> scam that saw customers of a major South African bank losing hundreds of thousands of rands. The scam, which was perpetrated around March of last year, saw huge sums of money (up to R200 000, in one case) being transferred out of clients\u2019 bank accounts and has led to significant backlash from those who feel that the bank acted negligently.<\/p>\n<p>It\u2019s become an all too familiar narrative. This year alone, the accounts of two of my colleagues (that I know of) have been pilfered by online attackers, leaving them with the unenviable task of trying to recover their money from their respective banks. In both instances, the victims had done absolutely nothing to compromise the security of their online banking profiles; the hackers were simply able to circumvent all the security measures that the financial institutions had in place.<\/p>\n<p>Hackers and other online criminals have also become<b> more creative with regard to their methods<\/b>, and it is becoming increasingly difficult to distinguish genuine communications sent from real banks from fraudulent emails, SMSs and even phone calls aimed at stealing one\u2019s personal information. These cyber-crooks and social engineers are continuously changing and innovating their <i>modus operandi<\/i> to be virtually undetectable.<\/p>\n<p>Here are some tips for protecting your assets and personal details against cyber-attacks:<\/p>\n<p>\u2022 Never, ever give your <b>ATM PIN<\/b> to anyone, even if they do claim to be from a (your) bank<br \/>\n\u2022 Never click on any <b>links<\/b> in emails from banks if you are not 100% certain that the communication is authentic. Rather <b>phone your bank<\/b> and request confirmation regarding the authenticity of the email<br \/>\n\u2022 Don\u2019t give your <b>Internet and cellphone banking passwords<\/b> to anyone<br \/>\n\u2022 Regularly run <b>anti-virus software<\/b> to check for malicious software such as spyware on your computer<br \/>\n\u2022 If you suspect that your online security has been compromised, notify the bank and, if necessary, the police immediately<br \/>\n\u2022 If you regularly do online shopping, ensure that you only use <b>reputable vendors<\/b> that make use of <b>secure payment gateways<\/b> for monetary transactions<br \/>\n\u2022 Don\u2019t respond to emails and\/or SMSs claiming that you have won a prize unless you are certain that you have entered such a contest<br \/>\n\u2022 <b>IMPORTANT:<\/b> take time to read<b> notices<\/b> on your bank\u2019s home page regarding the latest phishing scams. Don\u2019t just click the x to close the dialogue and get on with your banking. Taking 5 minutes to read the warning could save you a lot of heartache and trouble<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s criminal is a completely different breed. Tech-savvy, sly, and immeasurably resourceful. He is able to adapt with ease to the forever-changing technological landscape, and use even the slightest weakness to his advantage. His tools are not crowbars and screwdrivers, but a mouse, keyboard and Internet connection. This newly-constructed reality has the distinct flavour of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[50,127,172,179,206,243],"tags":[],"class_list":["post-7753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centurion-systems","category-hacking","category-online-security","category-phishing","category-security","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Will 2017 be the Year of the Hacker? - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Will 2017 be the Year of the Hacker? - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Today\u2019s criminal is a completely different breed. Tech-savvy, sly, and immeasurably resourceful. He is able to adapt with ease to the forever-changing technological landscape, and use even the slightest weakness to his advantage. His tools are not crowbars and screwdrivers, but a mouse, keyboard and Internet connection. This newly-constructed reality has the distinct flavour of [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-02-23T13:20:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"Will 2017 be the Year of the Hacker?\",\"datePublished\":\"2017-02-23T13:20:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/\"},\"wordCount\":657,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"centurion systems\",\"hacking\",\"online security\",\"phishing\",\"security\",\"Uncategorized\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/\",\"name\":\"Will 2017 be the Year of the Hacker? - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-02-23T13:20:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/will-2017-be-the-year-of-the-hacker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Will 2017 be the Year of the Hacker?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Will 2017 be the Year of the Hacker? - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/","og_locale":"en_US","og_type":"article","og_title":"Will 2017 be the Year of the Hacker? - Centurion Systems French","og_description":"Today\u2019s criminal is a completely different breed. Tech-savvy, sly, and immeasurably resourceful. He is able to adapt with ease to the forever-changing technological landscape, and use even the slightest weakness to his advantage. His tools are not crowbars and screwdrivers, but a mouse, keyboard and Internet connection. This newly-constructed reality has the distinct flavour of [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/","og_site_name":"Centurion Systems French","article_published_time":"2017-02-23T13:20:00+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"Will 2017 be the Year of the Hacker?","datePublished":"2017-02-23T13:20:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/"},"wordCount":657,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#primaryimage"},"thumbnailUrl":"","articleSection":["centurion systems","hacking","online security","phishing","security","Uncategorized"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/","url":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/","name":"Will 2017 be the Year of the Hacker? - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-02-23T13:20:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/will-2017-be-the-year-of-the-hacker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Will 2017 be the Year of the Hacker?"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/7753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=7753"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/7753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=7753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=7753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=7753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}