
Life Matters | Apr 17,2020
Apr 25 , 2020
By Carolyn Kissane
In the age of digital technology, we find ourselves more vulnerable than we had ever previously imagined. For this, we do not even have to go into the sketchy underbelly of the web. It usually comes to us.
Recently, I stumbled upon a vacancy on Telegram, a popular messaging app in Ethiopia and throughout the world, for temporary recruitment. The vacancy said that they were looking to hire individuals who were interested in helping test various applications for at least two hours a day and who had either a smartphone or a personal computer and internet access.
Interested, I contacted the person who posted the vacancy, and he sent me a file format to install the application. He also gave me instructions on how to install the app and asked me to screenshot the “installation complete” pop-up for verification.
I tried to do this the next day. But downloading the app was unsuccessful. I thought it might have been my internet connection. I gave it a second try but was unsuccessful.
Later that day, I tried to contact the person who posted the vacancy, but his username had been deleted, and our correspondence had disappeared. Thus, I turned to a tech-savvy friend of mine and sent him the app for a query.
My friend called the second he received the file and told me to turn off my internet connection and delete the format file to - using his technical term - remove the backdoor Trojan app.
It turns out that the app was a virus. Had I installed it, I could have given the hackers access to my camera, microphone and basically anything saved in my phone. The thought that someone could be watching me through my phone camera at any point and time without my knowledge sent chills down my spine.
This is something we have to consider further as our use of digital technology increases. It seems that every other person in Addis Abeba is sporting a smartphone these days.
Although our engagement with the worldwide web is negligible in comparison to other places, we are already witnessing a number of its pros and cons. We have everything from internet celebrities (vloggers) to social media activists. A less-discussed corner of the internet is Ethiopia’s own version of the dark web, where hackers are known to congregate.
Indeed, not all hackers are bad, and the negative connotation related to the word can be misleading. There are two kinds: black hat and white hat hackers. As obvious as it sounds, the former have malicious intent, while the latter are security experts testing systems for vulnerabilities who are also known as pen testers or penetration testers.
There are two tried and true methods of hacking. One is purely hardware-based. The other is the exploitation of people in the process of hacking them, which almost happened to me.
The hacker first places themselves in the mind of their victims and develops a way for them to install, click or open a file granting them access to the victim. How this is achieved often varies. One popular way has been Telegram.
In between the constant posts for shoes, jackets, glasses and household items, we may find ourselves face to face with a fake Telegram account with users posting Android installation files usually between 90Kb and one megabyte. The files usually come in the form of a data saver format file or even a wallpaper.
Many fail to pay attention to the file size and install these apps that disappear, never showing up in our app drawer, and we just move on. Unknowingly, what we have installed is a tool that allows the hacker to do a number of things from triangulating our location to reading our passwords. Most eerily, whenever we are connected to the internet, the hacker is able to access the camera or listen in on the microphone.
This has become quite a common occurrence. That is why we should be careful of the applications we install on our devices, especially those we find on such social media platforms and the links we find in the random emails we are sent.
As a rule of thumb, whenever we come across such applications prior to installing them, let us either ask someone who knows about these things or do some research on our own. Otherwise, we may have a digital Peeping Tom on our hands.
PUBLISHED ON
Apr 25,2020 [ VOL
21 , NO
1043]
Life Matters | Apr 17,2020
Radar | Sep 26,2021
Viewpoints | Feb 15,2020
Editorial | May 29,2021
Radar | Mar 23,2019
Viewpoints | Apr 20,2020
Films Review | Jul 06,2019
Fortune News | Jun 08,2019
Sunday with Eden | Dec 04,2021
Life Matters | Sep 26,2021
My Opinion | 127611 Views | Aug 14,2021
My Opinion | 123788 Views | Aug 21,2021
My Opinion | 121941 Views | Sep 10,2021
My Opinion | 119795 Views | Aug 07,2021
Dec 22 , 2024 . By TIZITA SHEWAFERAW
Charged with transforming colossal state-owned enterprises into modern and competitiv...
Aug 18 , 2024 . By AKSAH ITALO
Although predictable Yonas Zerihun's job in the ride-hailing service is not immune to...
Jul 28 , 2024 . By TIZITA SHEWAFERAW
Unhabitual, perhaps too many, Samuel Gebreyohannes, 38, used to occasionally enjoy a couple of beers at breakfast. However, he recently swit...
Jul 13 , 2024 . By AKSAH ITALO
Investors who rely on tractors, trucks, and field vehicles for commuting, transporting commodities, and f...
Apr 13 , 2025
The federal government will soon require one year of national service from university...
Apr 6 , 2025
Last week, the International Finance Corporation (IFC), part of the World Bank Group...
Mar 30 , 2025
When the private satellite channel, Ethiopian Broadcasting Service (EBS), aired an em...
Mar 23 , 2025
Getachew Redda, head of the Tigray Interim Regional Administration (TIRA), at least u...
Apr 13 , 2025
Some parts of Merkato have fallen uncharacteristically silent, contrary to its typical bustle of traders, shoppers, and hawkers vying for bu...
Apr 13 , 2025 . By AKSAH ITALO
Takeaways: Retroactive VAT enforcement on soybean cake has become a tax flashpo...
Apr 13 , 2025 . By BEZAWIT HULUAGER
A redevelopment initiative along Africa Avenue (Bole Road) has set off alarm bells for property owners wh...
Key Takeaways Federal legislators called for reforms and increased enforcement to protect Ethiopian...