Sentinel Logo
SECURITY | INTERNET
I grouped Internet and Cybersecurity since they are closely related.

Internet issues are common these. In a world that is always connected and more tools are used as online services opposed to software that is installed on your system. Everything from browsing to email requires a functional internet connection

Cybersecurity is critical (INFOSEC) If you do not under the the role of cybersecurity today you are better of not using your computer. Most people think in terms of Viruses and Anti-virus software when this word is mentioned but that absolute and compared to the reality of essentially nothing but a cliffnote

InfoSec (Information Security) is far more important than many think and relates to more than the above. NOT UNDERSTANDING THIS WILL
  • Have you use the internet falling victim to scams so complex you may not even realize it is but a trap
  • Have you risk Identity theft
  • AI is so sophisticated in the wrong hands someone can create a video showing doing something criminal REGARDLESS of you doing anything, even YOU will believe you did it
Many people still believe that scams, malware and loss of income relates to the standard typing mistakes in email and using software to protect them is the order of the day, This however is no longer the case and on the right I will explain all things related to cybersecurity.
CONTACT DETAILS INTRO
While I mention on the right to consult a security expert. Which you should be careful when doing, however, since you really do no want to take any chances with any sort of Malware rather consult a an expect you can trust. Below is my contact details. I make use of Proton Mail.

Proton was born in Switzerland in 2014 when a team of scientists who met at CERN (the European Organization for Nuclear Research) decided to build a better internet where privacy is the default. It is the most secure and privacy focussed email service by far. You may be using GMAIL and well perhaps you should read WHO is using Proton and why. I will add the link to Proton below, however, since people tend use email addresses listed online chaos results, with proton, I can track who is using attempted to scam me.
MY CONTACT DETAILS
Steville Hattingh
info@qf-security.co.za
Phone
+27 66 291 3687
In case you want to verify my creditendials, you can visit either:
Master of Computing
Belgium Campus iTversity
Bachelor of Computing
SAQA
COMMON ISSUES
Generative AI
Sora is a new generative AI technology. Nothing in this video is real. Not the characters, nor the scenes. Nothing in this clip is real. It is all computer generated. Given the ease of use regarding this technology from the actual content to the camera angles, nothing about this is real. At the time of this upload it is still in beta and being tested but the first portion of this clip (the longer solo clip of the first segment can be found online). However to the easy in how the entire video segment is generated is by using the simple prompt (text input) "a stylish woman walks down a Tokyo street filled with warm, glowing, neon and animated city signage. She wears a black leather jacket, a long red dress and black boots." Then you simply wait a short while while OpenAI's Sora is generating the content. This is how simple it is.
Another example of generative AI showing a news anchor which unless you know will be assumed as a real person. This example is newer than the previous example. It shows how these are improving. Like the previous example nothing in this clip is real and this all computer generated.
The danger with Generative AI
Given the ease of use, this technology allows any person to create whatsoever they want without the need of involving anything else but access to this this tool. OpenAI, which is behind the creation of Sora is not the only company providing users with these technologies. All major companies are doing this and some already makes Sora look like something from the past. Some using these types of Generative AI have already used it to make criminals from people and most recently a man was jailed as result of some bad actor who abused this technology. So, as result legislators are not drafting new regulations in attempt to restricted those from misusing these tools for malicious intent.

While there are benefits in using this technology, there are disadvantages with consequences that many are not considering such as
  • This can be used to spread information that is harmful
  • Since it is obvious that it will have an impact in terms of jobs. After all, there would be no need to creative artists, presenters, actors and so on would not be needed
  • Scripting a fake invasion and far worse
  • When dealing with online support, this could be used in real-time to scam you in vaious ways


Deep Fake videos
This clip shows a Deep Fake video by using Obama as an example. Deep Fake content requires more time and skill to create and you need certain skills which only a few have and the intention of showing this is show how you cannot tell the difference. If someone for example want to start a nuclear war to use an extreme example, it is not hard to imagine how this can be accomplished. Again, if the clip did not mention it was fake nor showed context to support this and if I did not tell you, you would like have believed this to be true.
The example here is far more dangerous as it is not a Deep Fake but AI-generated. It is an AI generated clip using Putin and unlike the other examples above this shows how effective generative AI can be and likewise you can only imagine how this can lead to a fake nuclear threat. The body language, tonality and voice is essentially perfect but again, as good as this is, the technology used is improving on a daily basis and soon you will not know what is true and what is false. There is no need to mention how can be extremely dangerous. Even Putin himself says how well this is done.
The danger with Generative AI
Given the ease of use, this technology allows any person to create whatsoever they want without the need of involving anything else but access to this this tool. OpenAI, which is behind the creation of Sora is not the only company providing users with these technologies. All major companies are doing this and some already makes Sora look like something from the past. Some using these types of Generative AI have already used it to make criminals from people and most recently a man was jailed as result of some bad actor who abused this technology. So, as result legislators are not drafting new regulations in attempt to restricted those from misusing these tools for malicious intent.

While there are benefits in using this technology, there are disadvantages with consequences that many are not considering such as
  • This can be used to spread information that is harmful
  • Since it is obvious that it will have an impact in terms of jobs. After all, there would be no need to creative artists, presenters, actors and so on would not be needed
  • Scripting a fake invasion and far worse
  • When dealing with online support, this case be used in real-time to scam you in vaious ways
The importance of 2FA
Sentinel Footer
The problem with passwords these days is not just how strong your password is. The problem is it does not matter if you might have malware on your computer. Say for example you have a keylogger on your system then what you type is saved within a logfile that is hidden but accessible by those who have access to the malware. Meaning whatever your password is, no matter how strong, if it is your only way to which you protect access to online services you may use such as Gmail.

When you have 2FA Authentication enabled it means that even if the bad actor have access to your access details, they will not be able to log in to your account. So what is 2FA Authentication exactly?

You may be familiar with an OTP (one time pin) which you normally have to enter when you do online banking. You may need to type in your username and password when you access your online banking but when you do a payment or even when you log in you may need to accept a code sent to your email or phone. This is the same concept 2FA authentication is based on. So for example. If you have this setting enabled then you will need to accept it on your phone before you can access the associated service
Modern Authentication Introduction
The problem with passwords these days is not just how strong your password is. The problem is it does not matter if you might have malware on your computer. Say for example you have a keylogger on your system then what you type is saved within a logfile that is hidden but accessible by those who have access to the malware. Meaning whatever your password is, no matter how strong, if it is your only way to which you protect access to online services you may use such as Gmail.

When you have 2FA Authentication enabled it means that even if the bad actor have access to your access details, they will not be able to log in to your account. So what is 2FA Authentication exactly?

You may be familiar with an OTP (one time pin) which you normally have to enter when you do online banking. You may need to type in your username and password when you access your online banking but when you do a payment or even when you log in you may need to accept a code sent to your email or phone. This is the same concept 2FA authentication is based on. So for example. If you have this setting enabled then you will need to accept it on your phone before you can access the associated service

There are several methods but I am only going to address two since most have access to these options
  1. 2FA-Authentication Explained
  2. Multi-factor Authentication Explained
Malware - From the Annoying to that which can ruin you
Sentinel Footer
Sentinel Footer
I have and will continue to stress the dangers of malware. One of the most potent threats that exist. Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes

Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords

In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. These are highly specific and security companies even now dread being questioned about it insofar as why they did not pick it up. See this malicious computer worm was in development at least since 2005 but was first uncovered in 2010. The estimated cost ranges wildly but sources estimate it cost somewhere between $100 million and $200. Reason behind this is because this project is classified still. But even now neither the USA nor Israel admit any involvement yet the purpose behind stuxnet is complex.

Different variants of Stuxnet targeted five Iranian organizations, with the probable target widely suspected to be uranium enrichment infrastructure in Iran and the gist of it was to render these equiptment useless or rather have it damage itself thus prevent enrichment of uranium and eventual Iran did retaliate using the same worm against the USA/Israel. Teh point behind this is to show the danger of malware. So we are NOT talking about something trivial

Below are some of the types of malware I will expand on in the tabs

  • ADWARE
  • TROJANS
  • WORMS
  • SPYWARE
  • BOTNETS
  • RANSOMWARE

Below you will find and exhaustive list on the six major types of malware. The list considers the threat posed by these various types from least to utter disaster. The most important details are explained and a lot of focus was spend on Ransomware. Though there is an overlap between the various types, they are still distinct. How they affect you may be similar. The difference with Ransomware however is waking up one day only to realize you cannot open anything (text, audio, video, images, etc.) and only to discover a RANSOM NOTE in each folder. At this point, there is very little you can do and I went into great detail explaining this.

Adware definition
Adware, also known as advertisement-supported software, generates revenue for its developers by automatically generating adverts on your screen, usually within a web browser. Adware is typically created for computers but can also be found on mobile devices. Some forms of adware are highly manipulative and create an open door for malicious programs.

Adware is software that displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device. Adware typically ends up on a user’s device through one of two ways:

  1. You might install a free computer program or app without necessarily realizing that it contains additional software that contains adware. This allows the app developer to make money but means you could download adware onto your systems without necessarily consenting.
  2. Alternatively, there may be a vulnerability in your software or operating system which hackers exploit to insert malware, including some types of adware, into your system.
How to tell if you have an adware infection
Signs that you may be infected with unwanted adware include:

Computer adware infection signs

  • An unexpected change in your web browser home page
  • Web pages that you visit not displaying correctly
  • Being overwhelmed with pop-up ads — sometimes even if not browsing the internet
  • Slow device performance
  • Device crashing
  • Reduced internet speeds
  • Redirected internet searches
  • Random appearance of a new toolbar or browser add-on

Mobile adware infection signs

  • Your phone is slow
  • Apps take longer to load
  • Your battery drains quickly
  • Your phone has apps you don’t remember downloading
  • There is unexplained data usage and higher than expected phone bills
  • There are numerous ad pop-ups
I mention Adware first because they pose less of threat opposed to other types of malware and most of the time the above mentioned is not what leads to data loss or data theft. However, slowing you system down over and extented period of time may harm your CPU which is the brain of your computer and can be costly to replace so best is to get this looked as soon as you notice the above symptoms.
Email validation Tools
As mentioned on this page, email is often used by scammers and hackers to gain access to your data. Below are a list of online tools to allow you to check if an email is valid or not. The tools below will will grow and change according to technicques used by scammers and hackers. The intent is to give you some basic information that can be of immediate benefit but also what security experts need especially if you are dealing with remote support.
Sentinel Footer
This simple tool allows you to verify if an email address is valid or not. It will also provide you with the technical data that security experts need if they need to take action whether it is technical in nature or perhaps even legal. All you need to do is enter the email address in the text box and click on VERIFY EMAIL