0
Everyone has something of value to a cyber criminal. Don't take the bait always stop and think before you act.
Here are some cyber-safe tips to think about:
1.In public
How the hackers do it?
Using special software, a hacker inserts themselves in the middle of an unsecured Wi-Fi connection between a server and its connected devices. Pretending to be both parties, the hacker relays information back and forth, gaining access to all the data being transmitted on the network.
Evil Twin:
Hackers can also easily create a free Wi-Fi network. Devices connected to such access points are then accessed by the hackers to spy on users. They might also try to get users to install malware by redirecting them to malicious sites.
Consequences:
Hackers can gain access to your confidential information, such as e-mails, personal files and credit card details.
They can also control the hacked device remotely, denying access to the device or even taking over the camera to spy on your activities.
2. Home computers
How the hackers do it
Missing patches and updates
Hackers target home computers with missing patches software updates issued by their makers to fix vulnerabilities within a programme. By missing patches and security updates, home users leave their devices open to being hacked.
Pirated software
Pirated software and applications from un-identifiable sources may be infected with a virus and are easy targets for hackers to compromise devices.
Phishing
Clicking on malicious e-mails or links can trick users into installing malware on their home computers.
Consequences
Once compromised, hackers can get almost any information stored in the computer which they can use to blackmail users or for any other nefarious activities.
Such devices can also be used to power the bot economy, spreading the malware through a network of hacked computers.
3. Smart Devices
How the hackers do it
Through default login settings
Smart home devices are usually connected to a wireless network. If the credentials are left in the default settings, hackers can use the default login information and gain easy access to such devices.
Consequences
Hackers can use these smart devices to collect private information about their users. Worryingly, hackers can even use these devices to record conversations or spy on users. This information may subsequently be sold on the black market, resulting in greater implications for users and the people around them.