All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2456930",
"signature": "Article:2456930",
"url": "https://staging.dailymaverick.co.za/article/2024-11-11-hack-back-how-to-protect-yourself-against-cybercriminals/",
"shorturl": "https://staging.dailymaverick.co.za/article/2456930",
"slug": "hack-back-how-to-protect-yourself-against-cybercriminals",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Cybercrime: how to guard against digital dangers",
"firstPublished": "2024-11-11 21:34:43",
"lastUpdate": "2024-11-11 21:34:47",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "26",
"name": "Sci-Tech",
"signature": "Category:26",
"slug": "sci-tech",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/sci-tech/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "360149",
"name": "Webinars",
"signature": "Category:360149",
"slug": "webinars",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/webinars/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6474,
"contents": "https://www.youtube.com/watch?v=B9QYENyo9fI\r\n\r\n<span style=\"font-weight: 400;\">The digital landscape has become a breeding ground for sophisticated cyber threats, leaving South Africans increasingly vulnerable. As the stakes get higher, it’s imperative that you prioritise your cybersecurity awareness and adopt robust defences against identity theft, phishing scams and financial fraud.</span>\r\n\r\n<span style=\"font-weight: 400;\">According to iDefense, an Accenture security intelligence company, </span><a href=\"https://www.accenture.com/za-en/insights/security/cyberthreat-south-africa\"><span style=\"font-weight: 400;\">South Africa has the third-most cybercrime victims worldwide</span></a><span style=\"font-weight: 400;\">, losing more than R2-billion each year. </span>\r\n<h4><b>Understanding the threat landscape</b></h4>\r\n<span style=\"font-weight: 400;\">Cybercrime takes many forms, from phishing and social engineering, to interception and deepfakes. </span>\r\n\r\n<span style=\"font-weight: 400;\">“Constant exposure to crime means that South Africans are hypervigilant when it comes to protecting their physical assets such as their wallets, jewellery and cash. But the cyber world means it’s now about the information you put out there and often people don’t think about what they are putting out,” Moodley said during the </span><a href=\"https://events.dailymaverick.co.za/events/2024/11/07/byte-sized-crime-unpacking-cyber-shenanigans?token=MEdjczVNYUpZeFBuZmN2SkdvQUJXTDNXc1YxTVd3WVlOZW5ZTGRmZTBIL1h0SEpOUEhYSnpxak1QZ0V0RXJrZUdyUVpJOHd6NnVSR01DRXFuVkxWZjdrWlZvTzJMMjA4bHdLSElJTXBzNXJnTCtkVytYYzRqUGpHZ1RzMzVYN1RFdWVxQTRLVTFuUktwckFudUtDVTd3PT0%3D&utm_source=Sailthru\"><span style=\"font-weight: 400;\">webinar</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Mogase agreed, adding that a friend had recently said it might be safer to ditch her “smartphone” which had all her private information on it and rather use a simple phone that only makes phone calls. “We have all our banking information, social media passwords – everything is on your phone and now we are seeing a rise in express kidnappings, where criminals kidnap you and force you to transfer money out of your bank account and/or demand a ransom from your family,” she said.</span>\r\n<h4><b>Types of cyber fraud</b></h4>\r\n<span style=\"font-weight: 400;\">There are several different types of cyber fraud to be aware of:</span>\r\n<ul>\r\n \t<li><strong>Identity theft:</strong> This occurs when someone gains access to your personal information such as your ID number and uses it to access credit. This credit is, of course, never repaid and affects your credit record should you ever need to take out a loan or apply for a store card;</li>\r\n \t<li><strong>Phishing</strong>: This happens when cybercriminals send you fraudulent emails or messages, purporting to be from the bank or a company you trust. Mogase said this is a form of social engineering that tops the list of cybercrime when it comes to individuals;</li>\r\n \t<li><strong>Parcel delivery scams</strong>: Since Covid-19, consumers have increasingly adopted online shopping, which means it is now quite common to receive parcels via a delivery service. “Cyber criminals call you or email you, pretending to be an agent from a logistics company or the Post Office and say you have to pay a small fee to have your parcel delivered,” Mogase said. This is quite often a “spray and pray” approach that goes out to thousands at a time, and will include account details that are not linked to the legitimate delivery service. As Mogase points out, although the delivery fees requested may be low, the total amounts recovered from hundreds of victims adds up to a significant amount;</li>\r\n \t<li><strong>Interception</strong>: A webinar viewer said he had fallen victim to this. Fraudsters intercepted his email communication with SARS and the end result was that three years’ worth of refunds were paid into the wrong bank account. Another example is receiving an email from someone you regularly make payments to, notifying you of a change in banking details. The big lesson here is to always pick up the phone and to confirm the email details before parting with funds. Mogase added that interception incidents are another form of identity theft, which is on the rise. “From a consumer point of view, you do have a responsibility to doubt, to have that zero trust.\" It is important to double-check and verify any form of notification you get “because sometimes, if it sounds too good to be true, then it is too good to be true, but sometimes it sounds so legitimate that you actually can fall into it. Now the question is: how do you know when to trust and when not to trust? For me, I would say that the minute there’s that undue urgency or pressure that’s exerted on you, you really need to stop and step back,\" she said. ;</li>\r\n \t<li><strong>Deepfakes</strong>: Artificial intelligence (AI) has become a powerful tool for cybercriminals, enabling them to create convincing deepfakes that can easily deceive individuals and organisations. Deepfakes combine existing images, video or audio of a person in AI-powered deep learning software that allows for manipulation of this information into new, fake pictures, videos and audio recordings. The software is fed images, video and voice clips of people that are processed to “learn” what makes a person unique. Deepfake technology then applies that information to other clips (substituting one person for another) or as the basis of fully new clips. Mogase cited the<a href=\"https://edition.cnn.com/2024/05/16/tech/arup-deepfake-scam-loss-hong-kong-intl-hnk/index.html\"> case of a CFO in Hong Kong who was tricked into making a $26-million payment</a> after being convinced he was on a video call with legitimate board members, only to discover later that it was all orchestrated using deepfake technology. “I later heard the easiest way he could have confirmed their identities would have been for him to ask them to please stand up and turn around. That would have immediately showed up a superimposed face,” she said. There are AI detection tools that can also help.;</li>\r\n \t<li><strong>Company impersonations</strong>: “The most common one is that they’ll phone you and say: ‘We are phoning from the bank and we’ve picked up a suspicious transaction on your account. So, to protect you from the fraud, you must do this.’ And actually, you’re playing into the fraud,” Moodley said. You have to be hypervigilant when it comes to this, because the banks are less likely to reimburse you if it turns out that you freely handed over security details or access to your account to a fraudster;</li>\r\n \t<li><strong>Hacking: </strong>If your devices are accessed or stolen by someone, you can have an extra layer of protection with multifactor authentication. This works by requiring additional verification information, such as a one-time password via your email or an authentication app such as Google Authenticator or even a fingerprint reader on your laptop. “After you’ve got your password, that asks you to confirm that you are who you really are, the most common tactic that is used is the OTP. But some could ask you to use facial recognition. Some could ask you to use your biometrics, because it’s another level of defence,” Mogase said.</li>\r\n</ul>\r\n<span style=\"font-weight: 400;\">As she concluded: “If</span><span style=\"font-weight: 400;\"> I put it simply, even in your own home you don’t just lock the gates and leave your doors open, your windows open, and your garage doors open. You lock everything up and put the alarm on. Online security should also have different layers.”</span> <b>DM</b>",
"teaser": "Cybercrime: how to guard against digital dangers",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "1002582",
"name": "Lisakanya Venna",
"image": "https://www.dailymaverick.co.za/wp-content/uploads/2025/05/WhatsApp-Image-2025-05-21-at-11.30.58.jpeg",
"url": "https://staging.dailymaverick.co.za/author/lisakanya-venna/",
"editorialName": "lisakanya-venna",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "3976",
"name": "Daily Maverick",
"url": "https://staging.dailymaverick.co.za/keyword/daily-maverick/",
"slug": "daily-maverick",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Daily Maverick",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12443",
"name": "Malware",
"url": "https://staging.dailymaverick.co.za/keyword/malware/",
"slug": "malware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Malware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "13107",
"name": "Identity theft",
"url": "https://staging.dailymaverick.co.za/keyword/identity-theft/",
"slug": "identity-theft",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Identity theft",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "20017",
"name": "Hacking",
"url": "https://staging.dailymaverick.co.za/keyword/hacking/",
"slug": "hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "44939",
"name": "AI",
"url": "https://staging.dailymaverick.co.za/keyword/ai/",
"slug": "ai",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "AI",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54794",
"name": "Phishing",
"url": "https://staging.dailymaverick.co.za/keyword/phishing/",
"slug": "phishing",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Phishing",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "99008",
"name": "Financial Sector Conduct Authority.",
"url": "https://staging.dailymaverick.co.za/keyword/financial-sector-conduct-authority/",
"slug": "financial-sector-conduct-authority",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Financial Sector Conduct Authority.",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "349214",
"name": "deepfakes",
"url": "https://staging.dailymaverick.co.za/keyword/deepfakes/",
"slug": "deepfakes",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "deepfakes",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "383924",
"name": "Neesa Moodley",
"url": "https://staging.dailymaverick.co.za/keyword/neesa-moodley/",
"slug": "neesa-moodley",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Neesa Moodley",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "414957",
"name": "Money Cents",
"url": "https://staging.dailymaverick.co.za/keyword/money-cents/",
"slug": "money-cents",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Money Cents",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "420935",
"name": "Lisakanya Venna",
"url": "https://staging.dailymaverick.co.za/keyword/lisakanya-venna/",
"slug": "lisakanya-venna",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Lisakanya Venna",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "424490",
"name": "Live Journalism",
"url": "https://staging.dailymaverick.co.za/keyword/live-journalism/",
"slug": "live-journalism",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Live Journalism",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "426638",
"name": "Phokeng Mogase",
"url": "https://staging.dailymaverick.co.za/keyword/phokeng-mogase/",
"slug": "phokeng-mogase",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Phokeng Mogase",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "426639",
"name": "multifactor authentication",
"url": "https://staging.dailymaverick.co.za/keyword/multifactor-authentication/",
"slug": "multifactor-authentication",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "multifactor authentication",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "114457",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/edGeZlEQO9Q9qveBCKXM4WcF020=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/9bsVU_KV8er7GrR50nITO72PPbg=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/W1iTK31ph8RMUIYvz3C2MrXOkv0=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ckXOlyiVMfbRfuULS5XirosJnAs=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/8BBj8EGQWOJKigWC5dWbL_bAoMs=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/edGeZlEQO9Q9qveBCKXM4WcF020=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/9bsVU_KV8er7GrR50nITO72PPbg=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/W1iTK31ph8RMUIYvz3C2MrXOkv0=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/ckXOlyiVMfbRfuULS5XirosJnAs=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/8BBj8EGQWOJKigWC5dWbL_bAoMs=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/11/2400x1200_ByteSizeCrime.jpg",
"type": "image"
}
],
"summary": "In a recent Daily Maverick live journalism webinar, Business Maverick editor Neesa Moodley spoke with Phokeng Mogase, the chief information officer at the Financial Sector Conduct Authority, about creeping digital fraud and how to improve your cybersecurity.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Cybercrime: how to guard against digital dangers",
"search_description": "https://www.youtube.com/watch?v=B9QYENyo9fI\r\n\r\n<span style=\"font-weight: 400;\">The digital landscape has become a breeding ground for sophisticated cyber threats, leaving South Africans increasingly v",
"social_title": "Cybercrime: how to guard against digital dangers",
"social_description": "https://www.youtube.com/watch?v=B9QYENyo9fI\r\n\r\n<span style=\"font-weight: 400;\">The digital landscape has become a breeding ground for sophisticated cyber threats, leaving South Africans increasingly v",
"social_image": ""
},
"cached": true,
"access_allowed": true
}