Hacking attacks are increasing. To make matters worse, hackers are now using many ways, from low tech methods to advanced techniques to steal your data and information. The main reason why hackers go after your personal information is identity theft! 9.2 million females fell victim to identity theft in 2014. 8.3 million males were also victimized.
Yahoo Says 1 Billion User Accounts Were Hacked in 2016.
Where You will Get HACKED Common Mistakes, and How to Prevent it.
Cyber-security threats are increasing. As more and move devices become internet capable, it's important to understand current
trends in security threats, identify vulnerabilities in your Internet security and protect your data against threats.
DATA TARGETED
What are the hackers after?
The primary data type targeted by attackers in 2016, as in 2014 was cardholder data-
98% Payment Data Stolen, payment card data are used in fraudulent transactions
- 2%- Confidential information & intellectual property
- 1%- Electronic Protected Health Information(ePHI)
- 1%- Business Financial Account Number
There were 18.5 MILLION victims in 2014. That's 2 victims every 3 seconds!
$21 BILLION was lost to identity theft in 2012.
7% of all American households are victims of identity theft. Financial loss per household is approximate $4,900.
Hacker checklist what hackers theft in actually!
- Username, passwords.
- Bank and credit card account numbers
- Professional license numbers
- Social Security numbers
- Employment and student ID numbers
- Insurance identification numbers
- Phone and utility account numbers
- Drivers license and passport numbers
- College or university financial aid information
Hackers checklist
METHODS OF ENTRY
Hackers have lots of different ways to steal your private data and information
THE TECHNICAL TERMS
SQL INJECTION- SQL Injection advantage of improper coding of your website and steal data.
REMOTE CODE EXECUTION- Remote Code Execution allows hackers to execute commands on your server from a remote location.
CLIENT-SIDE ATTACK-- Client-side attacks exploit the trust relationship between a user and the websites they visit.
REMOTE FILE INCLUSION-- Remote File Inclusion allows hackers to include a remote file through a script on the web server.
USER INTERACTION-- User Interaction depends on the user to interact with a specific element in order to access data
AUTHORIZATION FLAW-- An authorization flaw lets remote un-authenticated user access files and triggers malicious attacks.
PHYSICAL THEFT-- Physical theft is when the theft has physically taken the private property like a computer or credit card to access.
UNKNOWN-- These cases where a method of entry is unknown had the week and/or default credentials.
Most used ways from hackers to hack a victim.
SOCIAL NETWORKS
All of this personal information could be used to steal your identity!
Home WIFI
HOTSPOTS
MALICIOUS WEBSITES
E-Commerce sites account for 48% of all attack investigations.
- 10% of spam messages are malicious.
- 7% of spam messages contain a link to the malicious website.
DETECTION
How are the hackers caught?Attacks have grown significantly in complexity, rendering the majority of "off the shelf" detection solution, like antivirus programs, ineffective. Additionally, malware often goes unnoticed by systems administrators despite being clearly visible to investigators.
DEFENSE
How can I protect myself?
1. PASSWORD SECURITY- Create a strong and unique password by using combinations of upper and lower case letters, special characters, and numbers
- More than 60% of people use the same password combination on multiple sites.
- Don't use easy to guess passwords like your dog's name or birthday!
2. BROWSER SECURITY
- 44% of people did not know how to protect their private information.
- LOGOUT When you don't log out, you're giving authorization to snoop.
- Do not share your personal information unless you are using a secure connection(HTTPs in the URL), and always log out your accounts.
3. NETWORK SECURITY
- Malware often comes in the form of a download you don't notice happening.
- On Windows, disabling AutoRun can stop 50% of Malware threats
- Default network security setting allows hackers to get into your computer. Always customize your security settings to protect your network.
4. WIFI SECURITY
- Home WiFi
"WPA2-PSK (AES): This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the latest AES encryption protocol. You should be using this option. On devices with less confusing interfaces, the option marked “WPA2” or “WPA2-PSK” will probably just use AES, as that’s a common-sense choice."
- Public WiFi
Use a VPN Service to Secure Your Internet Connection.
VPN conceals your IP address and secures your data by encrypting your internet traffic.
- Protects your privacy online.
- Encrypts all your data and information.
- Prevents online spying.
- Prevents hackers from stealing your data.
I really appreciate when you share your feedback and eagerly waiting for it. Please let us know how useful was this tutorial for you and how can this cool Tips help you to better engage with hackers. Would be waiting to hear from you. :)






0 comments:
Post a Comment
Hey visitor we are glad to serve you our services get in touch with us for more fabolus posts.