Karuppaiah Veeraiah , product manager of Ulaa browser, was featured on Radio Mirchi's Expert Junction show where he navigated the intricate landscape of cybersecurity and online threats. This brief Q&A provides a concise glimpse into the insightful interview.
Q: In today's digital age, cybercrimes are on the rise, constantly evolving alongside technological advancements. Can you shed light on the current cyber threats?
A: Dealing with cyber threats is like navigating an elusive battlefield; you often can't pinpoint who the enemy is. Technology, being a powerful ally, requires responsible handling to avert potential problems and catastrophes. Being mindful of the information we share online, coupled with responsible technology use, can address a significant portion of issues. Yet, sophisticated attackers continue to employ advanced techniques, making it crucial for us to delve into them one by one.
Q: How do these cyber attacks actually happen?
A: We're surrounded by various apps, including dating and chatting platforms, yet we often overlook their authenticity. Leaving unused applications on your phone poses a risk, potentially leading to the leakage of private information and making you susceptible to morphing and manipulation. Taking prompt action by deleting unused and unnecessary applications is a simple yet effective precaution. If your personal data falls into the wrong hands, attackers might create fake accounts and attempt to exploit your friends and followers for monetary gain. Unsuspecting individuals could unwittingly part with their money, falling prey to these deceptive tactics. It underscores the importance of vigilance in protecting ourselves from such potential threats.
Q: How to protect ourselves from morphing attacks? (Face deep detection)
A: If you find yourself a victim of a morphing attack, the initial step is to open up about it with family, friends, or trusted individuals. Keeping them informed about the situation and requesting them to delete any morphed pictures or videos if shared is crucial. For legal purposes, consider filing a complaint to address the issue formally. With the rise of technologies like AI and OpenAI, morphing faces into videos or photos has become remarkably easy, often misused for nefarious purposes. If targeted by such an attack, raising awareness within your circle is essential. Sitting idle in fear might make you susceptible to other threats. Vigilance and proactive measures are key in navigating the digital landscape.
Q: Tell us more about one of the most popular cyber attacks today - the Phishing attack.
A: Phishing has become a prevalent technique in today's cyber landscape. Here's how it works: You receive an email or message claiming that your Twitter account is on the verge of deactivation unless you update your information within a specified timeframe. Intrigued or concerned, you click on the provided link, only to be directed to a website that impeccably mimics the genuine Twitter site but with a different domain name. The visual resemblance is so convincing that it's challenging to discern the fraudulent site, especially for those less familiar with domain names. Inadvertently, individuals may end up entering their username and password, unknowingly granting access to the attacker.
Once in control, attackers often exploit the common practice of using the same "strong" password across multiple sites. They scour various platforms using the compromised credentials, potentially jeopardizing security on multiple fronts. To protect ourselves from phishing attacks, it's crucial to scrutinize messages and emails, ensuring they originate from the official domain.
Q: How to stay safe from these attacks?
To stay safe from phishing, always double-check messages and emails. Make sure they're from the real website. If you get messages from your bank, call them directly to verify before taking any action. Another smart move is to log in separately to your bank's official site to see if they've sent you any important messages. Being cautious and taking these steps can help keep your personal data safe.
Q: If we fall victim to phishing, what legal steps should we take?
A: When it comes to the legal side of phishing attacks, the government has specific criteria for pursuing complaints. While major offences will undoubtedly be addressed by the authorities, smaller incidents may not receive the same attention due to resource constraints. It's crucial for us, as users, to prioritize our own safety by practising secure online habits. In cases of significant offences, government intervention is likely. However, for minor offences, the process of tracing and punishing attackers may be beyond the government's bandwidth. Many individuals get away with smaller offences, highlighting the need for digital responsibility on our part.