HACKING MADE EASY

LEARN ETHICAL HACKING TO PREVENT BEING HACKED

 

  HOME                                                            WELCOME TO YOU                                          YOUR COMMENTS        CONTACT US

                  FOR MORE INFO CONTACT at   info@hackingmadeeasy.com or call at +91-8800646642                                  

ABOUT US           OUR BOOKS           HOW TO ORDER            SERVICES           HACKING OVERVIEW        HACKING TRICKS

 

 

 

 

Computer Threats You Cannot Afford to Ignore

 

Computer Threats You Cannot Afford to Ignore

Advancement in technology also implies advancement in the negative effects of technology. This translates to more sophisticated means and mechanisms of cyber-attack, putting every device user at a risk. More often than not, lay users are unaware of the myriad threat possibilities that lurk around. We often rely on a single, inbuilt antivirus program without bothering to upgrade it on a timely basis. This simply will not do, if you wish to stay cyber-safe. 

There are several computer threats that you must constantly watch out for, and cyber incidents arise from the most unexpected sources: 

USB drives: An infected USB stick is the last thing you want connected to your computer, since it multiplies the possibility of a malicious malware playing havoc with your system. It is surprising to note that over half of us tend to use a USB drive without first testing it. In fact, in a cyber-crime racket busted in Australia, hackers had gone about randomly dropping unmarked USB sticks containing malware through letterboxes, expecting users to lap it up and use it as a “freebie.” The fact that current operating systems such as Windows and macOS do not scan USB drives by default just helps the cyber criminals’ cause. The answer to remaining safe lies in not plugging in any random device, even though it may be from a trusted source. Make sure your antivirus is configured correctly, and scan your device repeatedly. Besides, new software that combats USB-driven malware has evolved, such as Panda USB Vaccine, Ninja Pendisk, and Bitdefender USB Immunizer. 

Webcam monitoring: The innocuous looking webcam may indeed be a source of cyber trouble. Hackers may turn to videotaping over the camera, or use the built-in shutter to do so. The best way to remain safe is to “disable” your webcam when not in use. In Windows, go to Device Manager> Imaging Devices and then right click on “Webcam” and click on “Disable.” However, on a macOS, you need to delete a file called QuickTimeUSBVDCDigitizer.component from Macintosh HD/ System/ Library/ Quicktime. Another option is to use certain third-party software specially designed to alert you in case your webcam is being accessed. OverSight for Mac and Who Stalks My Cam for Windows are examples. 

Wi-Fi spying: With all the public connections that our devices have with the outside world, no data is completely safe. For instance, once connected to the Ethernet, your data is vulnerable. This is particularly true for public Wi-Fi networks such as coffee shops, hotels etc. The precaution that you need to take is to stick to sites that use secure HTTPS connections. Also, consider installing and using a VPN (Virtual Private Network) app such as AirVPN, IPVanish, TunnelBear, CyberGhost etc. While storing data, it is a good idea to add a layer of encryption and protection. Finally, pay attention to the basics—upgrade your applications regularly to remain updated with the latest in security features. 

Social engineering: Hackers today play around with the psyche of device users, prompting them to take certain actions that may put them at threat. Social engineering is an example, where users are enticed to click malicious links while opening emails. It is important that you stay wary of what is genuine and what is a false prompt to a cyber attack. Be suspicious of social media popups and emails; make sure that you do not part with excessive information online. Phishing is a very common threat, where a pseudo-website is made to look real, and may lead to malware attacks. Secure your social media presence—be sure of what you share, and turn on security measures such as a two-step verification for your accounts. 

While a hundred third-party applications may be out in the market to address our cyber security woes, nothing can beat being aware and alert, and being on the lookout for abnormal behaviors. Only then can one expect to stay safe, while enjoying the freedom and information access that our modern gadgets give us.

 
 
 

 -----------------------------------------------------------------------------------------------------------------------------------------------------------   

Disclaimer : The information provided on this web pages are for educational purposes only. The author of this book or the CEO of this website is in no way responsible for any kind of damage resulted by the information given on this site or book. This does not have any hacking or cracking software on it. The soul purpose of this site and book is to make impart knowledge and make people aware of the security concern and make themselves ready towards safe computing.

 -----------------------------------------------------------------------------------------------------------------------------------------------------------   

HOME  |  ABOUT US   |  OUR BOOKS  | HOW TO ORDER | SERVICES | HACKING OVERVIEW | HACKING TRICKS | CONTACT US

Copyright © 2014-2015. www.hackingmadeeasy.com  Reproduction Strictly Prohibited. All Rights Reserved 

 

Clicky