Top 7 Ways to Stop Hackers From Picking You

Thursday, November 24, 2011



First, The new target: your mobile device


If you connect an iPhone, Blackberry, Android, or any other phone to the Internet, the device is only a mini-computer. And that's exactly how you can protect your vehicle with the locks, you should always "lock" your phone by creating a password. At first it may seem embarrassing to constantly enter the PIN before you can access mobile applications, however, the phone contains enough personal information seriously compromise your identity if lost or stolen phone. Without a security PIN or password, e-mail, saved passwords and network access is easily accessible by anyone who finds the phone. In fact, many scammers buy stolen phones, because it is so easy to provide a password reset via the Web or e-mail to request your bank account. Consider the financial implications and problems for you, your company, or worse, your customers! Put a password on your smart phone and use it regularly in order to protect the information.

Second, Password: A strong password is important



Strong passwords are essential to keep your data safe. This can not be stressed enough! You can set different passwords for your e-mail and desktop / laptop or may be the same. Whatever you choose, it is imperative to not use your name as a password. You should also avoid using any word in the dictionary to be something obvious like your company name, your pet or child, or passwords at least 8 characters long. It should also numbers, uppercase letters and special characters (if the symbols are supported in your environment), as well as the password. No password str0ng can easily hackers access to your e-mail account, steal your data and then send malicious e-mails to everyone on your list of contacts. Not the one that infects all, because "Password" Your password should be.

Third, Thumb / flash: Beware of strangers



What happens when you leave your desk or on foot, car park and is a flash drive? If your computer to try out some of the content, to find the rightful owner? Probably not. After signing up with little memory to the USB port, you can silently install a Trojan that hackers direct access to the network. Worse yet, a program that hides in the background that captures all the keystrokes, screenshots of what turn on the monitor, the camera, you see, and even turn on the microphone to eavesdrop on your conversations. If you really want the contents of the flash drive, plug it into a computer not connected to the Internet, is perhaps an old man who is not and not recycled. Remember, even if the computer is not connected to a network, a virus on a flash drive or destroy all data. Use antivirus software to scan for viruses on your hard drive if you have this feature.

4th, Wireless Networks: Behavior of the war is not dead


If you laptops and smart phones to connect to the Internet via a wireless network, another important access point for hackers. Patterns of use of wireless devices are so easy to install and easy to go to the store and buy whatever is on sale. Simply according to the chart, you have made all the connections in minutes. The result is now wireless Internet! Hooray! And it works! "Can I use the Internet, and everyone is happy!" Yes, everyone, especially the pirates are thrilled. This is because there use devices that hackers to connect "unsecured network" which will have no password. Although wireless technology has developed hacking of wireless networks has been "war driving" as. Now hackers can use in their homes or public places to stay and "insecure network" to get full access to the network and shared files as if they are sitting at a desk in the office. Other times, hackers with unsecured wireless networks in illegal, fraudulent credit cards that can be committed again traced back to your website. Moral of the story: protect your wireless network. If you do not know how to do it, you should consult a professional.

5th, Phishing: Do not use a rod and reel


Phishing usually comes from an e-mail that seems to have been sent by a legitimate business, such as a bank, credit card, e-mail provider, etc. phishing e-mail is written in the rule to a " update request account information "contains a link to the official website for the research, but harmful. As these pages as effective from the legitimate site, fake (imitation) will be copied, it can be difficult to distinguish between the official website and the phishing site. If you are illegally on the site, sensitive account information like account numbers, passwords, credit card numbers, social security numbers, etc. will be collected when users try to "update" their information. Many times, the user will receive an error message that their information is not correct, so that once again in the data, make sure the crooks have all the information they need! We can express how important it is a good way to try to avoid the official opening of the "phishing" e-mail have.

6th, Friends compromise: e-mail accounts compromised


In addition to not open e-mails from people who do not know, you have to be careful of e-mails that are sent from your friend's account displayed. If you receive a message from someone on your contact list, but the object is empty, odd, or ambiguous, do not open the message. Yahoo, Hotmail, Gmail, and all user accounts have been hacked and opened countless unsuspecting recipients of e-mails containing a virus from someone in their friends list. The result is sufficient to affect the recipient of e-mail accounts to a nasty virus that has multiple e-mails to the rest of the list of contacts will be sent. As a rule of thumb: If you are unsure of your friend or associate e-mail in all, you can always be made on the phone or send a check for your own message to the subject line. It is better to open the message and on the side of caution rather than a victim of your friend's e-mail account affect delay.

7th, Safe Browsing: Some memories


You should avoid clicking on links in e-mails. The link may appear, what happens to your favorite Web page, but the code behind the link, which you redirect them to the site that looks identical to the wrong official website. Never click on links in the email to reset your password if you asked not only to reset the password in less than five minutes before. If you send an e-mail with a link that you must change your password for each account, delete it immediately and directly contact the company says. Finally give out personal information when you are 100% that you know on the right side. You should always use the URL of the agent in the browser address bar or bookmark / add to the official website to your favorites.

0 comments:

Post a Comment