The Commonest Ways You Can Be Hacked In This Technology Dispensation -[CHECKLIST]

Advertisements

Undoubtedly, the introduction of the computerization technology has been a blessing to the world, but also a curse as well.

The narrative above stems from the fact that the bad persons in this technology world most especially the computerized side have made it burdensome for individuals as they devise ways to suppress, steal, and even defame innocent people.

This is what most people still find it difficult trusting things and systems made with the modern technology. Though it serves a good purpose to mankind.

Advertisements

MyLifeGuideOnline research team has gathered some of the easiest ways people can be hacked and these are:

1. Hotel Computers/Kiosks -What is termed as cafe in most countries is one of the easiest ways to hacked people. Individuals visit these places to make good use of the computers which are not their personal ones, end making their data available on the devices which could be used the next persons who will visit the same place to use the same device if the first user fails to log out.

2. Your Outdated Computer -Are you still using Windows XP? Unplug it and step away from the computer. It is now very vulnerable and is no longer updated by Microsoft. If you don’t keep your computer’s operating system and all the software installed on it up to date, you can suffer from being hacked quite easily, often by one of the other mechanisms on this list.

Advertisements

3. Compromised Ad Networks -One of the best ways for a hacker to spread malware on trusted websites is to compromise the advertising networks that these sites use to run ads. This is what has happened to many trusted websites, including some major news organizations, and this usually results in a disaster for the people who visit them if malicious advertisements are shown.

4. Unsafe Thumb Drives/Media -Unless you’ve bought it and know exactly what’s in it, never plug an unknown USB stick into your computer. This also applies to SD cards, CDs and DVDs. Malware can run automatically to infect your machine, sometimes without you knowing it.

5. Reused Passwords -You should always use a unique password for every website account you have. Don’t log into Facebook with the same password you use for your bank, for example. If a website account is compromised, as often happens nowadays, a hacker who gets your username/password can try this combination on any other website.

Advertisements

6. Phishing -Be careful what you open or click in your email! Hackers have become very good at hiding fake emails containing malicious attachments or links to malicious websites designed to compromise your computer. They may even make it look like these emails come from reliable sources, such as your bank.

7. Malware -Potentially from multiple sources, it doesn’t just serve as a pop-up or bore you to install antivirus software, it can turn your computer into a “zombie” that can be awakened when a hacker decides to use it. In many cases, a hacker would control a “botnet” made up of thousands of zombies to launch attacks against a person, a company, a government or a website. Suddenly, your computer is complicit in this effort!

8. Public WiFi -Don’t trust the WiFi from the café or airport you frequent, because you never know if a malicious hacker presents itself as a WiFi hotspot, hoping you’ll log in and try to connect to your bank, for example. It may also feel all the traffic on the normal WiFi access point, scan your PC for vulnerabilities, etc. Always use a VPN if you need to use free WiFi, use a firewall on your system and keep everything up to date.

Advertisements

9. Drive-By Downloads -It’s a term that sounds scary, and it is, as it can happen when you visit a website that would normally be trustworthy. If you visit a website that has been hacked, it may seem to act normally, but it can secretly scan your computer or mobile device to detect known vulnerabilities, install malware through any vector it finds, and then be able to do just about anything. This includes stealing your data, monitoring your behavior, secretly viewing your data via your webcam, and much more.

10. Cross-Site Scripting (XSS) -A hacker can exploit the javascript code flaws of a website to compromise cookies stored in your web browser, which could cause it to steal your personal information or even your login credentials to that website and others. In some cases, they may even steal the contents of your system’s clipboard, other website cookies, and usernames and passwords.

Advertisements

Leave a Reply

Your email address will not be published. Required fields are marked *