All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "463824",
"signature": "Article:463824",
"url": "https://staging.dailymaverick.co.za/article/2019-10-28-the-dark-web-already-has-you-in-its-grip/",
"shorturl": "https://staging.dailymaverick.co.za/article/463824",
"slug": "the-dark-web-already-has-you-in-its-grip",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "The Dark Web already has you in its grip",
"firstPublished": "2019-10-28 01:32:49",
"lastUpdate": "2019-10-28 01:32:49",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 5227,
"contents": "<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Perhaps you think it’ll never happen to you, but here’s a hard truth: your personal information </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>has</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> been compromised and is probably already for sale on the Dark Web.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The bad news is, there’s not much you can do about it. The good news is, you can protect yourself against future and further breaches.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Before we get into that, here’s some context: The <a href=\"https://www.fin24.com/Finweek/Business-and-economy/sa-business-underplaying-the-danger-of-cybercrime-20190313\" target=\"_top\" rel=\"noopener noreferrer\">threat of cybercrime in South Africa</a> has never been more severe. SA has the third-highest number of cybercrime victims worldwide – and the country loses about R2.2 billion a year to cyber-attacks.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Breaches affecting <a href=\"https://www.fin24.com/Companies/ICT/five-massive-data-breaches-affecting-south-africans-20180619-2\" target=\"_top\" rel=\"noopener noreferrer\">major companies</a> – including Liberty, Ster-Kinekor, Master Deeds, ViewFines and Facebook – have exposed the information of millions of South Africans.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Don’t think you’ve been affected? Think again.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Your personal data is broadly available online. On how many webpages have you entered your e-mail address, phone number, and birthday – to sign up for new services, open accounts or download a free e-book? And on how many of these sites have you used the same or similar passwords?</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The reality is that any information that is connected to the internet is vulnerable to theft. And it doesn’t take much for a hacker to compromise your data, to sell it on the Dark Web or use it in social engineering attacks.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Wait! The Dark what?</b></span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The mainstream internet that you access every day represents 3% to 4% of the actual internet.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Underneath this sanitised “public” layer is a massive marketplace for stolen data, personal information, trade secrets, intellectual property, explicit content and malware. Welcome to the Dark Web: a hidden network of websites that is inaccessible to normal web browsers and represents about 93% of online content.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">It’s not all bad. Intranets, online databases and member-only sites also live on the Dark Web. But it’s </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>mostly</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> bad: a haven for illicit activity and a playground for cybercriminals. You need special resources to access it and those that do almost always mask their identities.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Anonymity is the Dark Web’s most appealing factor and if you’ve ever been a victim of a data breach (and you </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>have</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">), this is where your information lives. Plus, it has probably changed hands a few times.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>You’re just a number</b></span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Cybercriminals target specific data types and, no, it is not your credit card details.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Why? Because credit card transactions are closely monitored by advanced banking systems, anti-fraud teams and high levels of monitoring expertise. It is quick and efficient for banks to identify and limit transactions that are not verified by two-factor authentication.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">That is not to say cybercriminals don’t want this information. They do, but they’re not willing to pay big bucks for it. The <a href=\"https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/\" target=\"_top\" rel=\"noopener noreferrer\">going rate</a> for a credit card and CVV number on the Dark Web is around $5. Your ID number is worth just $1.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">So, what </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>are</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> they willing to pay good money for? Your phone number, e-mail address and username.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">These have nowhere near the same level of sophisticated monitoring and intervention as credit cards. And, while it is easy to replace a compromised credit card, it’s a hassle to get a new phone number or e-mail address.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hackers know this, which is why the exploitation of legitimate e-mail addresses and cellphone numbers can go undetected for months or years. It is also why the information, in general, is more valuable than a single transaction on a credit card.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Once they have your info, hackers sell it to businesses for marketing purposes or use it for more nefarious activities, like fraud.</span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>How to stay safe(r)</b></span></span></p>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Assuming your information has been stolen, how can you protect yourself online? Knowledge and experience. The more you know, the safer you’ll be. Here are some top tips:</span></span></p>\r\n\r\n<ul>\r\n \t<li>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Passwords</b></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">. You already know this. Choose strong ones and change them regularly.</span></span></p>\r\n</li>\r\n \t<li>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Clicks</b></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">. Phishing and social engineering attacks are still the most common hacking methods. Don’t click on links in e-mails. Don’t open attachments from people you don’t know. And, if you get an e-mail from someone you </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>do</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> know but it seems “off”, pick up the phone and ask. They might have fallen victim to an impersonation attack.</span></span></p>\r\n</li>\r\n \t<li>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Accounts. </b></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Monitor your bank account carefully</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">. Flag unusual transactions immediately and block any compromised cards.</span></span></p>\r\n</li>\r\n \t<li>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Silence. </b></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Be secretive</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">. Don’t dish out your info to callers or respond to unsolicited e-mails.</span></span></p>\r\n</li>\r\n \t<li>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><b>Scepticism. </b></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Don’t be tricked into a Dark Web scan.</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> Service providers – some scrupulous, others legitimate – claim to be able to scan the Dark Web for your information. But it is simply not possible to scan the entire Dark Web in 10 minutes. At best, these scans give you a false sense of security by scanning publicly available database lists, but these only account for a fraction of the Dark Web. Just because your info is not on these lists does not mean it is not stored elsewhere. (At worst, a scammer could pose as a service provider and actually </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">add</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> your info to the Dark Web.)</span></span></p>\r\n</li>\r\n</ul>\r\n<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There is no way to </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>guarantee</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> your safety online but you can prevent yourself from becoming a soft target. Learn about the risks, educate yourself and be less trusting.</span></span> <span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><u><b>DM</b></u></span></span></span></p>\r\n<p lang=\"en-ZA\" align=\"LEFT\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Brian </i></span></span></span><em><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Timperley</span></span></em><span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i> is the CEO of </i></span></span></span><span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Turrito Networks</span></span></span><span style=\"color: #000000;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: xx-small;\">, </span></span></span><span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>a Gauteng-based telecommunications and technology provider.</i></span></span></span></span></span></p>",
"teaser": "The Dark Web already has you in its grip",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "36726",
"name": "Brian Timperley",
"image": "https://www.dailymaverick.co.za/wp-content/uploads/Brian-Timperley-opinionista.jpg",
"url": "https://staging.dailymaverick.co.za/author/brian-timperley/",
"editorialName": "brian-timperley",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "195310",
"name": "cyber attack",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-attack/",
"slug": "cyber-attack",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber attack",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "42374",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/_LLsYqAETevWnWD9X-It5Lxm3ls=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/-qvi-N-6_1Ve3ftx_go5mi6qqO4=/450x0/smart/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/m6kpGzARo1JkmYbPRv7UnnGGj9U=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/hlVZM888_Xs40UEYxiMSQF70GSY=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/juXPUPouR6JV1vc1NsXZ4NAUmTs=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/_LLsYqAETevWnWD9X-It5Lxm3ls=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/-qvi-N-6_1Ve3ftx_go5mi6qqO4=/450x0/smart/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/m6kpGzARo1JkmYbPRv7UnnGGj9U=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/hlVZM888_Xs40UEYxiMSQF70GSY=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/juXPUPouR6JV1vc1NsXZ4NAUmTs=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Timperley-letter-to-the-editor-2.jpg",
"type": "image"
}
],
"summary": "Your data has already been compromised. The good news is that all is not lost and you can take steps to protect yourself.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "The Dark Web already has you in its grip",
"search_description": "<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Perhaps you think it’ll never happen to you, but here’s a hard truth: your personal information </span></span",
"social_title": "The Dark Web already has you in its grip",
"social_description": "<p align=\"LEFT\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Perhaps you think it’ll never happen to you, but here’s a hard truth: your personal information </span></span",
"social_image": ""
},
"cached": true,
"access_allowed": true
}