RAT in the system
Sharon McLeay
Times Contributor
Alberta prides itself on being rat free, but our virtual space is another matter.
RAT’s (Remote Administration Tools) are used with your consent by system providers to sense out problems with your hardware/software; but more often than not, they are used without your consent by criminals who sneak a RAT Trojan into a personal device, along with that new free app that was just downloaded.
Paul Davis is an IT Tech with 26 years’ experience. He is a social networking safety consultant, who has been interviewed by major networks, and works with law enforcement and security agencies across Canada. He has seen the many ways people open doors in their technology for criminals to virtually waltz in and ruin their lives.
He said criminals can access your laptop, tablets and phone devices through Xbox, Skype, e-mail, unsecured Wi-Fi sites, Facebook, Instagram and many of the other social networking sites. They use the data to scam or sell you stuff, stalk, target family members for kidnapping or sexual purposes, steal money, steal identity information and sometimes spread inaccurate information, or sell confidential information over the web.
Davis said many people do not place passwords to open their phones or tablets, yet 56 per cent of people will lose or misplace their phones.
Over 600 cellphones were left on Edmonton buses last year and Davis said last year 120,000 phones were lost or misplaced on airlines. The forgotten iPad on airplanes is also becoming a regular occurrence. Staffs note that people will grab their phones, but leave the iPad or tablet behind.
Using a similar or simple password for all your tech devices also sets tech criminals up to gain access to your information. Storing those passwords on the device only makes it easier for criminals to figure out all your accounts, once they hack in.
“The lazier you are, the easier you make it for hackers,” said Davis.
He said to use at least a six character, unique, complex password for each account and change passwords every three months. He said back up the password log on a stick, place it away from the device in a secure location, or better yet, record all passwords in a book that is secured away from the computer.
Davis wants users to consider keeping addresses, birthdates and confidential information off profile sites and don’t post your whereabouts on Facebook. Criminals can use your location and track your GPS functions to know where you are and monitor your daily habits. Davis has information available on how to safely turn these off.
For e-mails and Twitter he suggests safety and embarrassment can be eliminated with the simple tip of thinking before you send or post.
“Write, take your hands off the keyboard, proof it twice and then post,” said Davis.
Too many people include emotions into their online correspondence and hit the send button, before they realize what they have sent.
He also advises ignoring texts that are meant to intimidate, bully, or gain an emotional response. It only intensifies the situation and can escalate to unforeseen actions in real life situations. The effect of Twitter comments and Facebook posts leading to self-destructive teen behaviour is just one example of how words can kill.
