• Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
Newsletter
Crypto Hoarding
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
No Result
View All Result
Crypto Hoarding
No Result
View All Result
Home Cryptocurrency Hackers

Five steps to protect your crypto and other assets from hackers – Moneyweb.co.za

Admin by Admin
March 16, 2021
in Cryptocurrency Hackers
0
Five steps to protect your crypto and other assets from hackers – Moneyweb.co.za
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Related articles

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

July 5, 2022
Alleged Chinese police database hack leaks data of 1 billion – Spectrum News NY1

Alleged Chinese police database hack leaks data of 1 billion – Spectrum News NY1

July 5, 2022

The freedom and power of the internet comes with massive responsibility. You have to defend yourself from attacks. No one will do it for you.

The downside of not defending yourself online is devastating.

.lm-item-bottom,.lm-item-desc,.lm-item-link,.lm-item-top{text-align:center;border-radius: 2px;}.lm-underline{position:relative}.lm-underline:after{position:absolute;content:’ ‘;right:5%;left:5%;bottom:0;height:1px;background-image:linear-gradient(90deg,transparent,#fff,transparent)}.lm-item-1 .lm-item-bottom,.lm-item-1 .lm-item-top{background-color:#212e52}.lm-item{vertical-align:top;float:left;display:inline-block;position:relative;cursor:default}.lm-item:after,.lm-item:before{z-index:-1;content:’ ‘;position:absolute;left:10px;top:80%;bottom:18px;right:10px;-webkit-transform-origin:bottom center;transform-origin:bottom center}.lm-item:after{-webkit-transform:rotate(6deg) translate3d(15px,0,0);transform:rotate(6deg) translate3d(15px,0,0)}.lm-item:before{-webkit-transform:rotate(-6deg) translate3d(-15px,0,0);transform:rotate(-6deg) translate3d(-15px,0,0)}.lm-item-top{padding-top:15px}.template-1 .lm-item-top{border-top-left-radius:7px;border-top-right-radius:7px}.lm-item-title{color:#fff;font-size:1.5em}.lm-item-price{background:rgba(255,255,255,.05);margin-top:15px;font-size:35px;line-height:30px;padding:15px 10px 10px;color:#fff;font-weight:700}.lm-item-price i{font-size:15px}.lm-item-price .small-pre{font-size:10px;position:relative;top:-16px;right:-5px}.lm-item-body{padding:15px 0 0;background:#fff;border:1px solid #ebebeb}.lm-item-desc{height:auto;font-size:14px;padding:0 10px}.lm-item-desc strong{color:#868686}.lm-item-desc p{color:#868686;margin:0}.lm-item-link a{text-decoration:none}.lm-item-bottom{border-bottom-left-radius:7px;border-bottom-right-radius:7px;padding:15px 5px;color:rgba(255,255,255,.7);font-weight:100;min-height:20px}.lm-item-bottom span{color:#fff;font-weight:400;margin-right:3px;-webkit-transform:skewX(-10deg);transform:skewX(-10deg);display:inline-block}#insider-gold-col ul .inner,#insider-gold-col ul li a.toggle:hover{color:#259990}.lm-item-link a.moreinfo{font-size:16px;line-height:35px;padding:3px 20px 0;border-color:#39bdb4;color:#39bdb4;background-color:#fff}.lm-item-link a.moreinfo:hover{background-color:#fff;color:#259990;border-color:#259990}.template-2 a.mny-button.style-4{top:-5px;position:relative}.lm-item-desc-short{text-align:center;height:auto;font-size:14px;padding:10px 15px}.lm-item-desc-short p{color:#8995b4;margin:10px 0 0 0}

Moneyweb Insider
INSIDERGOLD

Subscribe for full access to all our share and unit trust data tools, our award-winning articles, and support quality journalism in the process.

#op-297:checked~.overlay-biginc{ opacity: 1; visibility: visible; -webkit-transition: opacity 0.5s; transition: opacity 0.5s;
}
#op-297:checked~.overlay-biginc #overlay-include-wrapper { opacity: 1; -webkit-transform: rotateX(0deg); transform: rotateX(0deg);
} #op-297:not(:checked)~.overlay-biginc #overlay-include-wrapper { -webkit-transform: translateY(25%) rotateX(-35deg); transform: translateY(25%) rotateX(-35deg);
}
.overlay-box{position:fixed;width:100%;height:100%;top:60px;left:0;background:rgba(255,255,255,.96);z-index:11111}.overlay-box label.close{width:58px;height:58px;position:absolute;right:4%;top:8%;color:#74809e;z-index:111111111;cursor:pointer;margin:0!important;font-size:35px;transition:all .2s ease}.overlay-box label.close:hover{color:#212e52}.overlay-box .gform_wrapper{margin:0 auto;width:50%;text-align:right;background-color:#fff}.overlay-box .gform_wrapper ul li{width:100%;text-align:right;float:right}.overlay-box .gform_wrapper ul li g-recaptcha{float:right}.overlay-box #overlay-include-wrapper{text-align:center;position:relative;top:15%;height:60%;font-size:20px;color:#212e52;-webkit-transform:translateY(-50%);transform:translateY(-50%);padding:10px}.overlay-trigger,.overlay-wrapper{display:inline-block}.overlay-trigger~.overlay-biginc{opacity:0;visibility:hidden;-webkit-transition:opacity .5s,visibility 0s .5s;transition:opacity .5s,visibility 0s .5s}.overlay-biginc #overlay-include-wrapper{-moz-perspective:300px}.overlay-biginc #overlay-include-wrapper{opacity:.4;-webkit-transform:translateY(-25%) rotateX(35deg);transform:translateY(-25%) rotateX(35deg);-webkit-transition:-webkit-transform .5s,opacity .5s;transition:transform .5s,opacity .5s}#overlay-include-wrapper a.mny-button{font-size:16px;line-height:35px;padding:3px 20px 0;color:#fff}#overlay-include-wrapper a.mny-button:hover{background-color:#259990;border-color:#259990}#overlay-include-wrapper p{font-size:12px;font-weight:500;line-height:1.5em}.overlay-trigger a.mny-button{font-size:16px;line-height:35px;padding:3px 20px 0;border-color:#39bdb4;color:#fff;background-color:#39bdb4}.overlay-trigger a.mny-button:hover{background-color:#259990;border-color:#259990}

Here is an everyday story: Sarah gets SIM-swapped while she sleeps.

People often do SIM swaps when, for example, they lose their phone and buy a new one.

In this case, an anonymous thief badgers a call-centre agent at her mobile services provider into switching the SIM card linked to Sarah’s phone number with a SIM card in their possession – using time-tested techniques: perhaps pretending to be Sarah (possibly using information gleaned about her online), talking about emergencies, or masquerading as a fellow call centre agent battling to log on.

Once the hacker gets control of Sarah’s phone using the new SIM, he checks the time zone Sarah lives in. Yes, Sarah is fast asleep. Sarah won’t notice anything has gone wrong until later the next morning.

Sarah has a bad feeling and checks her phone during the night. Her WiFi is on. Everything looks like it is okay, but it isn’t.

Now that the hacker has taken over Sarah’s phone by way of a SIM swap, he can go to her Gmail account, type in her email address and ask to recover her password to her phone.

Gmail obliges and sends the recovery password to the hacker-controlled phone. The hacker goes through all the financial services on Sarah’s email: bank accounts, home loans, crypto exchanges and credit cards. He is an expert at what he does.

Sarah’s primary email is essentially her digital identity.

One by one the hacker probes and resets the bank and crypto exchange passwords. The passwords are sent to the Gmail address. Sometimes a one-time-password or text message (Sarah’s two-factor authentication method of choice) is sent to the hacker-controlled phone to confirm access to Sarah’s account. Sarah has two crypto exchange accounts with her bank account linked to both. The hacker sends funds from Sarah’s bank account and home loan to one of the exchanges and does a quick market order to buy crypto. Sarah had a large access bond on her house, and a healthy current account balance for her child’s education.

The hacker buys a huge amount of bitcoin with Sarah’s money. He then sends the crypto to his own crypto wallet. He checks any crypto and fiat balances on the next crypto exchange – and then cleans them out. The crypto takes 10 minutes to appear in his wallet.

The hacker is accomplished and thorough. He deletes all the emails from all his password resets and transfer shenanigans, leaving no trace for Sarah to unjumble her life.

Over the next few hours all Sarah’s available funds are drained. All her bank accounts – current, home loan, savings – are empty.

All the crypto assets she owns on a variety of different exchanges are drained.

All of it – gone.

This SIM-swap scenario happens every day

Imagine this happening to you. This event can break a person. Bring a person and their families to their knees.

There are some key steps to take that can prevent this from happening to you or your family.

Knowledge is power. Here is a simple framework to help guide individuals to protect their identity and assets online.

There are three pillars in my framework called ‘Internet Freedoms’: First you defend, then you advance and lastly, you become powerful (sovereign).

Here are five simple steps to start defending your digital identity and online assets.

Step 1: Remove your mobile phone number as a recovery method from your primary email

Sarah linked both her phone number and secondary email as a recovery method.

This is an exploit possibility once you have been SIM-swapped. Once a hacker has control of your phone number, he will use the recovery method of your primary email to reset your password. The hacker then has access through which he change all of your online accounts.

Remove the recovery methods (both mobile phone number and email) as a matter of urgency. This protects your digital identity from being hacked.

Step 2: Use a password manager to create unique and strong passwords

You may be a bit lazy to do this because it means downloading a password manager like LastPass and creating strong and unique passwords for all of your online platforms.

But, be encouraged that this is best practice.

You can create many difficult and unique passwords using your password manager and you only have to remember one hard password to unlock the password manager.

If your email address and password haven’t been breached before, then you don’t have to do this step. If your data has been breached, then you need to download a password manager like LastPass or 1Password and start to update and harden all your passwords.

To check if your data has been breached, go to this website and type in your email address: Have I Been Pwned.

Once you download the password manager remember to add two-factor authentication (2FA) – using an authenticator app on your mobile phone like Google Authenticator or Authy (it’s free) to your password manager. Your password manager is your digital vault and you want it bulletproof.

Step 3: Add 2FA to your primary email using an authenticator app

Sarah did not have a two-step verification set up for her Gmail account.

As part of this step, you need to use the password manager to strengthen your password.

For the second step go to security settings on your primary email account and set up 2FA.

This – using a strong password and also a time-based authentication (2FA) on your mobile phone with an authenticator app – protects your digital identity from being hacked.

Step 4: Replace all SMS two-factor authentications (2FAs) with a time-based one-time password using an authentication app

Sarah took the easy option and used the text message (SMS) sent to her mobile phone for 2FA.

Banks often use SMS 2FA. This is a vulnerability for SIM swaps.

Make sure you convert all of your SMS 2FA to use an authenticator app like Google Authenticator and Authy.

Step 5: Authy app users must turn off this one dangerous default setting

If you use the Authy app it is crucial that you disable a default setting that will make you vulnerable to a SIM swap – even with 2FA installed.

When you first create an Authy account, ‘multi-device’ is enabled by default.

This means you’ll be free to set up any other device to use your same Authy account and 2FA tokens. All you’ll need to do is download and install Authy on the desired device, add your phone number, and allow this new device on your original Authy installation.

Beware. This is exactly what a hacker will do.

Disable this multi-device on your Authy app immediately.

You have now started a good base for defending your online privacy and security. It all starts with taking responsibility. There are many more steps to take on your journey to become powerful (sovereign).

Eugéne Etsebeth is former CEO of crypto exchange iCE3 and specialises in training related to ‘Internet Freedoms’.

Share76Tweet47

Related Posts

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

by Admin
July 5, 2022
0

Although the cryptocurrency market and its flagship asset Bitcoin (BTC) have been struggling in the first half of 2022, a...

Alleged Chinese police database hack leaks data of 1 billion – Spectrum News NY1

Alleged Chinese police database hack leaks data of 1 billion – Spectrum News NY1

by Admin
July 5, 2022
0

HONG KONG (AP) — Hackers claim to have obtained a trove of data on 1 billion Chinese from a Shanghai...

Is My Cryptocurrency Safe From Hackers? – NewsPatrolling

Is My Cryptocurrency Safe From Hackers? – NewsPatrolling

by Admin
July 5, 2022
0

If you are investing in cryptocurrency, it is imperative that you undertake measures to secure your investments. As compared to...

British Army’s Twitter and YouTube accounts hacked to promote cryptocurrency scams – CNBC

British Army’s Twitter and YouTube accounts hacked to promote cryptocurrency scams – CNBC

by Admin
July 4, 2022
0

A screenshot of the British Army's Twitter profile when it was hacked, via Wayback Machine. Its profile and banner pictures...

Last Week [in] Crypto: Anonymous Investigates Terra’s Founder. – BeInCrypto

Last Week [in] Crypto: Anonymous Investigates Terra’s Founder. – BeInCrypto

by Admin
July 4, 2022
0

Last week was chaotic with breaking stories causing tremors in the crypto space. Amid the noise, BeCrypto has curated the...

Load More
  • Trending
  • Comments
  • Latest
Major Changes Coming to XRP Ledger As Ripple-Backed Startup Launches Key Amendment in Beta Testnet – The Daily Hodl

Major Changes Coming to XRP Ledger As Ripple-Backed Startup Launches Key Amendment in Beta Testnet – The Daily Hodl

April 21, 2021

SteveWillDoIt reveals hacker stole his crypto wallet: “I lost a lot of money” – Dexerto

July 26, 2021
Forte’s PTI gets financial transaction licenses for blockchain games – VentureBeat

Forte’s PTI gets financial transaction licenses for blockchain games – VentureBeat

February 11, 2022
DOGE passes Uniswap and Litecoin to become 8th largest cryptocurrency by market cap – Cointelegraph

DOGE passes Uniswap and Litecoin to become 8th largest cryptocurrency by market cap – Cointelegraph

April 15, 2021
Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

0

Rivals Ripple and R3 partner up | PaymentsSource – American Banker

0
Ripple seeks shelter in D.C. from Libra’s political storm – American Banker

Ripple seeks shelter in D.C. from Libra’s political storm – American Banker

0

Litecoin Gets Bullish Speculation, at Last, as Upgrade Approaches – Coindesk

0
Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

Crypto hackers loot $2 billion in H1 2022 as cybercriminals thrive – Finbold – Finance in Bold

July 5, 2022
Bitcoin miners struggle with crypto’s price decline, rising energy costs, and increase in mining difficulty – MarketWatch

Bitcoin miners struggle with crypto’s price decline, rising energy costs, and increase in mining difficulty – MarketWatch

July 5, 2022
Ripple may benefit from new Supreme Court makeup in XRP lawsuit – FinanceFeeds

Ripple may benefit from new Supreme Court makeup in XRP lawsuit – FinanceFeeds

July 5, 2022
How miners are preparing for Ethereum’s Merge and the implications on ETH price – FXStreet

How miners are preparing for Ethereum’s Merge and the implications on ETH price – FXStreet

July 5, 2022
Crypto Hoarding

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Categories tes

  • Bitcoin
  • Blockchain
  • Cryptocurrency Hackers
  • Ethereum
  • Litecoin
  • Ripple

Newsletter

[mc4wp_form]

  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us

© 2017 JNews - Crafted with love by Jegtheme.

No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us

Copyright (c) 2021 - Crypto Hoarding - All Rights Reserved - web design by TechyRack