Viewpoints | Jan 23,2021
Apr 25 , 2020
By Carolyn Kissane
In the age of digital technology, we find ourselves more vulnerable than we had ever previously imagined. For this, we do not even have to go into the sketchy underbelly of the web. It usually comes to us.
Recently, I stumbled upon a vacancy on Telegram, a popular messaging app in Ethiopia and throughout the world, for temporary recruitment. The vacancy said that they were looking to hire individuals who were interested in helping test various applications for at least two hours a day and who had either a smartphone or a personal computer and internet access.
Interested, I contacted the person who posted the vacancy, and he sent me a file format to install the application. He also gave me instructions on how to install the app and asked me to screenshot the “installation complete” pop-up for verification.
I tried to do this the next day. But downloading the app was unsuccessful. I thought it might have been my internet connection. I gave it a second try but was unsuccessful.
Later that day, I tried to contact the person who posted the vacancy, but his username had been deleted, and our correspondence had disappeared. Thus, I turned to a tech-savvy friend of mine and sent him the app for a query.
My friend called the second he received the file and told me to turn off my internet connection and delete the format file to - using his technical term - remove the backdoor Trojan app.
It turns out that the app was a virus. Had I installed it, I could have given the hackers access to my camera, microphone and basically anything saved in my phone. The thought that someone could be watching me through my phone camera at any point and time without my knowledge sent chills down my spine.
This is something we have to consider further as our use of digital technology increases. It seems that every other person in Addis Abeba is sporting a smartphone these days.
Although our engagement with the worldwide web is negligible in comparison to other places, we are already witnessing a number of its pros and cons. We have everything from internet celebrities (vloggers) to social media activists. A less-discussed corner of the internet is Ethiopia’s own version of the dark web, where hackers are known to congregate.
Indeed, not all hackers are bad, and the negative connotation related to the word can be misleading. There are two kinds: black hat and white hat hackers. As obvious as it sounds, the former have malicious intent, while the latter are security experts testing systems for vulnerabilities who are also known as pen testers or penetration testers.
There are two tried and true methods of hacking. One is purely hardware-based. The other is the exploitation of people in the process of hacking them, which almost happened to me.
The hacker first places themselves in the mind of their victims and develops a way for them to install, click or open a file granting them access to the victim. How this is achieved often varies. One popular way has been Telegram.
In between the constant posts for shoes, jackets, glasses and household items, we may find ourselves face to face with a fake Telegram account with users posting Android installation files usually between 90Kb and one megabyte. The files usually come in the form of a data saver format file or even a wallpaper.
Many fail to pay attention to the file size and install these apps that disappear, never showing up in our app drawer, and we just move on. Unknowingly, what we have installed is a tool that allows the hacker to do a number of things from triangulating our location to reading our passwords. Most eerily, whenever we are connected to the internet, the hacker is able to access the camera or listen in on the microphone.
This has become quite a common occurrence. That is why we should be careful of the applications we install on our devices, especially those we find on such social media platforms and the links we find in the random emails we are sent.
As a rule of thumb, whenever we come across such applications prior to installing them, let us either ask someone who knows about these things or do some research on our own. Otherwise, we may have a digital Peeping Tom on our hands.
PUBLISHED ON
Apr 25,2020 [ VOL
21 , NO
1043]
Viewpoints | Jan 23,2021
Viewpoints | Feb 12,2022
Radar | Sep 26,2021
Life Matters | Oct 15,2022
Viewpoints | Aug 19,2023
Verbatim | Jul 13,2025
Fortune News | Jun 08,2019
Editorial | Jan 15,2022
My Opinion | Sep 24,2022
Viewpoints | Apr 20,2020
Photo Gallery | 185854 Views | May 06,2019
Photo Gallery | 175895 Views | Apr 26,2019
Photo Gallery | 171452 Views | Oct 06,2021
My Opinion | 139410 Views | Aug 14,2021
Dec 22 , 2024 . By TIZITA SHEWAFERAW
Charged with transforming colossal state-owned enterprises into modern and competitiv...
Aug 18 , 2024 . By AKSAH ITALO
Although predictable Yonas Zerihun's job in the ride-hailing service is not immune to...
Jul 28 , 2024 . By TIZITA SHEWAFERAW
Unhabitual, perhaps too many, Samuel Gebreyohannes, 38, used to occasionally enjoy a couple of beers at breakfast. However, he recently swit...
Jul 13 , 2024 . By AKSAH ITALO
Investors who rely on tractors, trucks, and field vehicles for commuting, transporting commodities, and f...
May 9 , 2026
The Ethiopian state appears to have discovered a fiscal instrument that is politicall...
May 2 , 2026
By the time Ethiopia's National Dialogue Commission (ENDC) reached the end of its fir...
Apr 25 , 2026
In a political community, official speeches show what governments want their citizens...
For much of the past three decades, Ethiopia occupied a familiar place in the Western...
May 9 , 2026 . By NAHOM AYELE
Finance Minister Ahmed Shide entered the last quarter of the fiscal year with a budge...
May 9 , 2026 . By NAHOM AYELE
At the Federal High Court's Lideta Division, on Dejazmach Bekele Weya Street, one of...
May 9 , 2026 . By BEZAWIT HULUAGER
Mayor Adanech Abiebie's cabinet has approved an additional 9.9 billion Br budget, a m...
May 9 , 2026 . By BEZAWIT HULUAGER
The fight over Cosmo Trading Plc has outgrown the courtroom where it began. What star...