Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      South African digital radio trial is about to go live - Aldred Dreyer

      South African digital radio trial is about to go live

      21 January 2026
      Major change to telco licensing rules in Europe - Henna Virkkunen

      Major change to telco licensing rules in Europe

      21 January 2026
      An inflection point for crypto in South Africa - Hannes Wessels Binance

      An inflection point for crypto in South Africa

      21 January 2026
      No risk of load shedding after Koeberg output scaled back

      No risk of load shedding after Koeberg output scaled back

      21 January 2026
    • World
      Taiwan, US strike strategic AI and chip supply-chain pact - TSMC

      Taiwan, US strike strategic AI and chip supply-chain pact

      20 January 2026
      Wikipedia moves to monetise AI giants' reliance on its content

      Wikipedia moves to monetise AI giants’ reliance on its content

      15 January 2026
      Visa moves to plug stablecoins into the global payments system

      Visa moves to plug stablecoins into the global payments system

      15 January 2026
      Oracle sued as bondholders allege AI debt plans were hidden - Larry Ellison

      Oracle sued as bondholders allege AI debt plans were hidden

      15 January 2026
      Activists call for X, Grok to removed from app stores - Elon Musk

      Activists call for X, Grok to removed from app stores

      14 January 2026
    • In-depth
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      DStv dodges channel blackout in last-minute deal with Warner Bros

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
    • TCS

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
    • Opinion
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » 2014: a golden year for cybercrime

    2014: a golden year for cybercrime

    By The Conversation4 January 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    crime-640

    Looking back, 2014 was not a good year for keeping things safe under digital lock and key. If a score was being kept, it might seem that the cybercriminals are in the lead, despite the valiant efforts — and own goals — from the cybersecurity profession worldwide.

    Cast your mind back to March. Everyone was panicking about the HeartBleed bug. Based on an error in code upon which the majority of the world’s secure servers relied, experts had plenty of time to fix the issue. Sadly there was an array of conflicting information about changing passwords, leading to widespread confusion. While most IT administrators made sure this was managed in a professional manner, it created a stir that seemed to set the tone for the year.

    In May, online auction giant eBay admitted to having been compromised. The site said its systems, with personal details of tens of millions of users, may have had been vulnerable for months. Everyone was advised, indeed forced, to change their password.

    In the same month, iPhones were hijacked and their owners blackmailed by the cunning Oleg Pliss ransomware, locking phones and threatening to delete data unless cash was paid.

    In this case, the criminals managed to acquire a database of usernames and passwords, maybe via HeartBleed, and cracked the passwords. As it’s well known that many users reuse the same passwords for many accounts, the Oleg Pliss attackers searched for iCloud e-mail accounts and simply stepped through their list of passwords until they were successful. Then they remotely locked the phones and demanded a ransom. What was clever about this attack is that it targeted the weak link — lax security among humans — rather than the tough target, the security of the iPhone itself.

    Already 3-0 to the cybercriminals by half-time, it wasn’t looking too good for Team Cybersecurity. In June there was finally a score for law enforcement: Gameover Zeus, a prolific botnet, was brought down through a combined operation from the FBI, UK National Crime Agency and other international agencies. It gave security experts time to hose down their systems, upgrade security measures and re-group, knowing that it would be weeks before this botnet could rally.

    The most popular mobile phone and tablet operating system, Android did not have a good year. With the most mobile malware, Android is seen as a system that needs to clean up its act, with vulnerabilities exploited through text messages, and potentially revealing intimate details left behind on second-hand devices that had been supposedly wiped.

    In July, the focus was back on Apple’s iOS phone operating system, in which a back door was discovered, proving a major embarrassment for the company. It’s interesting that the subsequent release of iOS, version eight, brought full encryption to the phone, suggesting that Apple has tried to fill this hole — much to the annoyance of some national security agencies.

    September arrived with a bang, as dozens of celebrities found naked pictures of themselves posted online. The issues earlier in the year that proved the potential to gain access to iCloud accounts had been realised, with the images stripped not from the phones themselves but from the iCloud accounts linked to them. Apple’s response was to generate a notification following any access to an iCloud account — but that may be too little too late if an intruder has already copied your more intimate snaps.

    Later the same month, the discovery of the Shellshock bug makes it 7-1. This was another issue arising from decades-old code in the Bash shell software, since incorporated into millions of computers and embedded devices worldwide. It’s ironic that, after years in which Microsoft Windows was regularly compromised, 2014 was the year in which the heat was turned on open-source systems like Linux.
    As November came around, we witnessed a spectacular own goal when a particularly complex and aggressive malware, Regin, was alleged to be the product of Western intelligence agency experts. Of course, nobody has come forward to take the credit, but it’s clear that there are very capable cybersecurity or cybercriminal experts out there who have the time and resources to create bespoke attacks for their own ends.

    December brings the season for joy for many — but not for Sony Pictures, which suffered an attack that leaked unreleased films online, posted embarrassing internal e-mails for all to see, and brought the company’s internal systems to their knees. Perhaps most embarrassing is that this seems to be becoming a habit for Sony.

    Come Christmas Day, the servers supporting the Xbox and PlayStation online gaming platforms were hacked.

    All in all, such a 10-1 thrashing points to an eventful year, and unfortunately leaves no doubt that the criminals have the edge, leaving the security experts nursing their own goals and playing catch-up.The Conversation

    • Andrew Smith is lecturer in Networking at The Open University
    • This article was originally published on The Conversation


    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSA should scrap pass-or-fail exam results
    Next Article These are the jobs of the future

    Related Posts

    How liberalisation is rewiring South Africa's power sector

    How liberalisation is rewiring South Africa’s power sector

    21 January 2026
    South African digital radio trial is about to go live - Aldred Dreyer

    South African digital radio trial is about to go live

    21 January 2026
    The tech transformation of sports betting

    The tech transformation of sports betting

    21 January 2026
    Company News
    The tech transformation of sports betting

    The tech transformation of sports betting

    21 January 2026
    How Norton is protecting digital lives in a hostile online world - Avert ITD Avert IT Distribution

    How Norton is protecting digital lives in a hostile online world

    20 January 2026
    Beyond the hype: trust is the first step to generative AI ROI

    Beyond the hype: trust is the first step to generative AI ROI

    19 January 2026
    Opinion
    AI moves from pilots to production in South African companies - Nazia Pillay SAP

    AI moves from pilots to production in South African companies

    20 January 2026
    ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality - Duncan McLeod

    ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

    14 December 2025
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    How liberalisation is rewiring South Africa's power sector

    How liberalisation is rewiring South Africa’s power sector

    21 January 2026
    South African digital radio trial is about to go live - Aldred Dreyer

    South African digital radio trial is about to go live

    21 January 2026
    The tech transformation of sports betting

    The tech transformation of sports betting

    21 January 2026
    Major change to telco licensing rules in Europe - Henna Virkkunen

    Major change to telco licensing rules in Europe

    21 January 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}