
Tamara Falcó and WhatsApp: cybersecurity lessons
"He started saying to me, well, maybe it's true. So, there I said, just so you know, I don't care if it's been six seconds or a nanosecond in the metaverse, if this is true, this is the end of it or this is the beginning of it, you decide". Last 8th of July, Tamara Falcó starred in one of the most eagerly awaited events of the year for all the members of the papier mâché: she said "I do".
The influencer and aristocrat Tamara Falcó, pronounced the famous phrase "a nanosecond in the metaverse"
But what does Marquise of Griñón have to do with cybersecurity? Let's review all her recent experiences with her current husband, Iñigo Onieva, and we will realise how you can go from being a victim to selling your own information and still be hacked again.
Last September, the influencer and aristocrat Tamara Falcó, pronounced the famous phrase "a nanosecond in the metaverse", which we have heard repeated ad nauseam, with which we can realise that no one is able to escape the art of deception and how valuable our information is.
In her statement Tamara alleged that her current husband's flirtation became public because her WhatsApp account had been hacked. But how is this possible, and the question that worries us all the most, could it happen to me? WhatsApp is an application that has more than 5000M downloads on Google Play, and like any application at any given time can have security flaws that can be exploited by cybercriminals.
But how they can gain access to our mobile device and hack into our account, let's review the ways in which a cybercriminal can trick us into the art of deception.
Let's start with the definition of a nanosecond: a nanosecond is one billionth of a second. This is a very small time scale common in computers whose processing frequency is a few hundred Megahertz.Continuing with the relationship between time and cybersecurity, the company Hive Systems has en conducting studies for some time on how long it takes a hacker to find out a password through brute force attacks.
How to defend ourselves against cyberattacks
There are several methods they use to make us believe that we are "safe" and to gain access to our information.
As we can see in the image, a hacker is able to find out a password immediately if it does not have the necessary necessary characteristics to be a strong password. Remember thata password is strong when it is of considerable length and contains symbols, uppercase, lowercase and even numbers.
Another way to hack into an account is by using social engineering, the art of deception par excellence of cybercriminals. There are several methods they use to make us believe that we are "safe" and to gain access to our information.
The most commonly used are the following
Baiting: the offender leaves a bait (usb, cd, etc.) in an easy-to-find public place, which is infected with malware, the aim being that the victim inserts it into their device to install the malware and steal information
Phishing: this is the technique par excellence. It is based on the sending of mails that impersonate the identity of acquaintances or entities with the aim of obtaining information
Smishing: (SMS+ phishing) Phishing attack via SMS. The content of the message invites you to click on a link that leads to a fake website, to enter sensitive information or to download an application that is actually malware.
Spear phishing: Specifically targeted phishing attack. The attack is personalised, which makes them more difficult to detect. The attacker employs OSINT techniques to obtain all publicly available information about the victim, thus modelling and directing the attack. It is vitally important to be aware of the information we post on the Internet about ourselves.
Vishing: a variety of phishing carried out by telephone. To lend more credibility to the call, criminals sometimes manage to falsify caller ID information. That is why we should never give out sensitive information by phone or messaging.
Information is power
The implementing protective measures is an indispensable part of avoiding infringement like copyright violation
After this episode of infidelity, Tamara decides to take a turn of events and give to Iñigo a new chance. She went from being a victim to becoming the person who, at the drop of a hat, sells information, her information, herwedding.
The magazine "Hola", was chosen by the celebrity to make the exclusive report and last Monday the 10th saw the light of day the millionaire cover. And this is where we find a new lesson in how information is so important in today's world.
This special issue, has been disseminatedthis special issue has been disseminated, reaching thousands of users again through the WhatsApp application, thus decreasing the number of copies sold and making us consider another important aspect of the information, such as the intellectual property.
Information security, where privacy and personal data protection are critical parts, thus becomes one of the most important aspects in cyberspace. As the use of the internet continues to grow, where content creation, and interaction between users can be susceptible to manipulation and theft, implementing protective measures is an indispensable part of avoiding infringement, copyright violation and most importantly, becoming victims of cybercriminals ourselves.
In short, learn with Tamara, take protective measures (strong passwords), be aware of the risks that exist (fraud, phishing, etc.), be careful who you share your information with in order to enjoy a safe and secure experience in cyberspace.