7 COMMON HACKING METHODS
- Get link
- Other Apps
Hackers have a lot of ideas when it comes to going after your data. In this article, we are going to share with you the 7 most used hacking methods to help you protect yourself.
Phishing or phishingThis hacking method consists of
deceiving the Internet user in order to encourage him to communicate his
personal and / or banking data by pretending to be a trusted third party (bank,
insurance, etc.).
How to protect yourself?
Never give out your password.
Besides, no reliable site will ask you again.
Make sure your antivirus is up to date.
When you are about to pay for a
purchase on the internet, make sure the website is secure. The address must
start with: "https".
If you have any doubts about an
email, do not open the attachment or the link it contains. Connect directly
from your browser by entering the official address.
Ransomware
Growing in popularity, ransomware
is malware that encrypts data and then sends a ransom note to the owner in
exchange for the key to decrypt it. Here are some examples of ransomware:
Wannacrypt, Locky, TeslaCrypt, and Cryptolocker.
How to protect yourself?
Regularly back up your data.
Learn how to identify
questionable file extensions. If you are in doubt, do not open them.
Do not open emails whose form or
origin seems doubtful to you.
Malware
Hidden in downloading software or
USB drives, malware has one purpose: to harm a computer system.
How to protect yourself?
To protect yourself from this
hacking method:
Only install software from
trusted sources.
Never connect a USB stick found
by chance or received in the mailbox, it can be trapped.
The trapped USB key
This hacking method can do damage
in seconds. Indeed, a found USB drive may contain various elements that can
steal or encrypt your data for ransom.
How to protect yourself?
It's very simple, never connect a
found USB key!
Fake websites
Administrative sites, online
shops, there is no lack of fake websites and they are there to recover payment
data or passwords. Be careful, fake websites are perfect copies of the original
websites.
How to protect yourself?
To avoid being fooled by fake
websites, never enter your payment details or passwords on sites that do not
have a name starting with "https".
Password theft
This hacking method involves
recovering the passwords of the victims. To do this, hackers use software
designed to try as many combinations as possible in order to find your
password. For this they use the data collected on social networks.
How to protect yourself?
When creating your password,
follow a few rules:
Create a complex password:
letters, uppercase, special characters and numbers.
Avoid using dates of birth, names
of your children, telephone numbers… or other elements appearing on social
networks.
Have a different password for
each account.
Install and update your antivirus and
anti-spyware regularly.
Fake Wi-Fi networks
In a public place, there are
often several Wi-Fi networks. Before connecting, check the reliability of the
network you are interested in to avoid having your data stolen.
How to protect yourself?
If you need to connect, make sure
the network is reliable, even if it means asking for confirmation from one of
the managers of the place: bartender, librarian, receptionist, salesperson,
etc.
Never install an update.
Never buy through these networks,
wait until you are on a reliable network.
Never connect to important sites:
bank account, emails, cloud.
- Get link
- Other Apps
Comments
Post a Comment