Skip to main content

5 ways you are being Hacked

   5 Ways You are Being Hacked



Web monitoring and mass surveillance has become a headache for most of us. Everyday some new malware makes its way into our lives through websites and applications that we use. It is important for you to know where the loopholes exist and eradicate them as soon as possible. So here are the top 5 ways people are getting hacked.

1> Password reuse
It may not sound to be a serious issue but it is one of the main reason responsible for password. What people do is that they use same password for every account that exists and make it easy for an attacker to hack all of their data in one go.Make sure you have a unique and strong password for each log in. It makes it harder for us to remember each and every password ,thus password managers were created.  

2>Malware downloads
If you surf the web regularly and try new apps for your mobiles, chances are you already downloaded some malware or will invite them in the near future.
30,000 websites are infected with malware every single day – Forbes
Major source of malwares are email attachments and malicious websites.Chances are high that you might end up downloading ransom ware, keyloggers or a malicious code installed on your device. Best way to tackle this is having a check on the person who sent you the email. Download files only from trusted sources.

3>Brute force attacks
Passwords like 'iloveyou' or '123456' are as easy to crack as they sound. Stop using such passwords and make sure to make them strong as all it takes is a few seconds to crack such passwords and destroy your privacy.

4>Social Engineering attacks
Phishing, spear phishing ,vishing and several other attacks have made the lives of hackers easier and ours difficult. Chances are high that you already received an email or web link or will receive in near time which says to log into your account and you click on it and land on a visibly real page and you end up giving your personal information. To be safe from such attacks always make sure that you visit a 'https' website rather than a 'http'.

5>Physical theft
What do we do when we don't remember passwords? 
We write them down and make it easy for others to have access to your information. Many of us simply do not use app passwords and make it easier for others to access our information. Start using app passwords and stop writing passwords down.

Comments

Post a Comment

Popular posts from this blog

Hiding files inside an Image on Android

You can hide your files behind an image and this technique is called Steganography. So lets get started. What is Steganography Steganography is an art of hiding a file, message, audio, video, or image within another file, message, audio, video, or image. The word steganography comes from two greek words "steganos" (meaning: concealed) and "graphein" (meaning: writing). The basic difference between cryptography and Steganography is that in cryptography only the message is hidden, but in Steganography, the message and the secret communication are hidden. A lot of good steganographic tools are available for Windows, Mac, and Linux, but not that much for the Android operating system. Now lets see how you can do the same GETTING STARTED Here is how to hide any file inside any image file on android: 1. First, you have to download NiaStego and install it on your android device. 2. Open the app, then you will see a window as shown below. 3. T...

Monitor secret connections that your computer makes.

How to see which websites your computer is secretly connecting to? Has your Internet connection become slower than it should be?  There may be a chance that you have some malware, spyware,  or adware that is using your Internet connection in the  background without your knowledge. Here’s how to see what’s  going on under the hood. It’s worth noting that most third-party firewalls will probably give you  this same type of information as well as block things that are trying to  connect… unless the applications managed to add an exclusion already.  Better check anyway. So, how do you find out what the problem is? There is an easy method using the netstat  command from a command prompt window. This works with Windows 10, 8, 7, Vista, and XP.  If you’re still using XP, make sure you are running at least Service Pack 2,  and just assume that somebody already hacked your computer because your operating  system is now a te...

Fileless Ransomware - All you need to know.

Fileless Ransomware - All you need to know. Many global companies, banks, and even some government organizations are struggling to protect everything from the newest type of threat that scared the world — Fileless Ransomware. The new version of ransomware has arrived — it’s stealthy, almost impossible to detect and is forcing every vulnerable organization to pay the ransom to cyber criminals. These attacks are called “fileless” or non-malware ransomware attacks in which the attack executes malicious commands with Microsoft’s PowerShell. It’s really important to mention that Non-malware or file-less ransomware (unlike some traditional ransomware) does not use any of the files to encrypt your data, but instead it writes scripts/macros which originate from PowerShell to encrypt the files. Fileless malware is a unique type of software and it's really difficult to detect because the malicious code is embedded into the native scripting language or written straight in...