Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series

Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind.

attack-stats

As one of the most genuine TV references to this burning issue, the 2015 cyber-thriller series Mr. Robot represents an interesting portrayal of the digital world and offers some insightful lessons on how online privacy could actually be reached.

Dealing with hacking, Mr. Robot proves that even some of the world’s largest conglomerates, embodied in E Corp in this fictional story, are not immune to it. Unfortunately, the material gain is not the only motivation for such transgressions. Sometimes, curiosity or even common malice can make any innocent bystander the victim of cyber breach.

Just take the example of the Mr. Robot protagonist, who has a complete control over his friends, associates, acquaintances or even random strangers’ privacy. However delusional Elliot is, most of his decisions are driven by moral principles. Now, the question is, what would have happened if this immense power were in hands of a real-life cyber criminal?

Precisely because it sets us in such a realistic scenario, Mr Robot points to some conspicuous threats we’re exposed to today.

1. The reckless use of social networks is the easiest way to get hacked

At the very beginning, Elliot states that online channels “are faking us into intimacy,” making “the world itself just one big hoax.” Not only that he hates everything social networks stand for, but also refuses to bow before them. By not being present on Twitter, Facebook or Instagram, he manages to remain untraceable to both his acquaintances and legal authorities.

Still, what makes Elliot despise social networks even more is people’s inability to understand that everything they like, post and tweet is completely meaningless. He uses his target’s innate desire to be sedated by virtual reality in order to hack into their lives. With all this in mind, you should make sure you use strong credentials for logging in to your accounts in order to keep your private data truly safe. Always remember that the more information you share online, the easier it is going to be for someone to get their hands on your privacy.

2. Your every password needs to be unique and non-transparent

Unlike in other similarly themed series, where hackers simply come up with one’s password out of nowhere, for Mr. Robot this process is far from common guesswork. This is best seen in Elliot’s explanation on how he managed to decode his therapist’s account by combining her favorite singer with her birth year backwards.

Namely, he possesses a brute force hacking tool, where he enters all the details from one’s life, such as their birth date, anniversary, pet’s name or favorite celebrity. Once all potential parameters are entered, the software further analyzes them and creates the list of possible password combinations.

The importance of creating strong and unique passwords is one of the most valuable lessons Mr. Robot taught us. When changing password, always make sure that you exclude your personal, easily predictable information, as well as the dictionary words that are easily cracked. Most importantly, never use the same password on multiple websites. Although it might be confusing, this step is vital for your privacy protection.

3. Regulated industries must meet security standards

With the adequate hacking tools and hard work, no person or institution is impossible to hack. The best reference to this statement is the Elliot’s explanation of how he managed to hack the hospital. What made its security vulnerable is the lack of both experienced IT department and adequate cyber protection equipment. Unfortunately, there are numerous real-life medical organizations dealing with similar problem.

What’s the most ironical about Elliot hacking his hospital with ease is that it is supposed to have all patients’ data under the maximum protection. Namely, if it ensured compliance with the Health Insurance Portability and Accountability Act (HIPAA), such things would be less likely to happen. With it, any hospital would be able to ensure that all the required physical, network and process security measures are in place and controlled.

4. Always protect your Wi-Fi Network

In the pilot episode, Elliot meets the coffee shop owner and accuses him of hosting child pornography websites. During the conversation, we find out that he managed to discover such information by observing the perpetrator through the shop’s public Wi-Fi network, which is a common scenario for the majority of public places. It only takes a little bit of technical know-how and adequate hacking software to intercept people’s activities on open Wi-Fi.

This is exactly where a VPN comes in. It is a virtual private network will tunnel your web traffic through an encrypted network, making it practically impossible for an Internet service provider, network owner and, most importantly, a nearby hacker like Elliot to track your browsing session.

5. Never connect a drive to your computer if you are not sure what’s in it

We all remember the scene when Ollie and Angela got a rap CD from an aspiring hip-hop artist, who later proved to be a hacker. Once the spyware CD was installed, the hacker was able to take the complete control over all their accounts and later blackmail them by threatening to use their webcam pictures, bank accounts and social network profiles.

Another example of how no one is immune to social engineering hacking techniques is the prison scene. Namely, in order to open the cell doors, Darlene scatters dozens of infected USB sticks. Ironically, it was the prison security guide who took the bait and endangered the entire community’s safety.

Conclusions

Mr. Robot performs a socially important function by raising awareness of the problem of hacking and offering a layman advice on how to protect ourselves in a hostile digital environment. Even though some of the aspects of hacking were definitely simplified for screening purposes, it still portrays this issue more faithfully than any of its predecessors. With all these facts in mind, you can focus on doing all that is in your power to protect your online privacy from vicious cyber assaults.

By Sarah Green

Business Virtual

Open Virtual Exchange (OVX) – Helping DSPs Fast Track the Monetization of SDWAN

Open Virtual Exchange (OVX) Bring agility and speed to market with intelligent network automation Digital Service Providers (DSPs) do have high expectations from virtual network services such as Software-Defined WAN (SD-WAN), as it promises to ...
Gary Bernstein

5 Notable Proxy Servers Adding That Extra Layer Of Privacy

What’s A Proxy Server? A proxy server is a gateway between the user and the internet. This is an intermediary server that separates end users from the websites they browse. It’s completely legal to use ...
Fahim Kahn

The 5 Biggest Hybrid Cloud Management Challenges—And How to Overcome Them

Hybrid Cloud Management Challenges The benefits of the cloud—reduced costs, greater IT flexibility, and more—are well-established. But now many organizations are moving to hybrid cloud management platforms. While hybrid clouds do offer a greater level ...
Ronald van Loon

Cognitive Science + Data Science: Next-Gen Data Driven Marketing

Next-Gen Data Driven Marketing What are the psychological motivators driving customer purchasing decisions? The era of ubiquitous digitalization, advanced analytics, and big data is here. Yet marketers frequently grapple with obtaining information that answers critical ...
Isc2

Episode 2: Coronavirus Phishing Emails and Work-from-Home Meetings

Coronavirus Phishing Emails What to watch out for as scammers exploit pandemic panic, and tips on how to attend meetings while working from home. Working from home this week? There are a few challenges and ...
Ian Hayes

Pick The Right AWS Course And Ensure A Brighter Future Ahead

Picking The Right AWS Course As the leader of the pack, AWS (Amazon Web Services) is the fastest-growing public cloud service in the industry, and it's all set to extend its dominance with a 52% ...