How to Protect Yourself From Hackers | The Odyssey Online
Start writing a post
Politics and Activism

How to Protect Yourself From Hackers

Here Are 4 Techniques They Use That You Should Be Aware Of.

21
How to Protect Yourself From Hackers

Over the past several years there has been an upsurge of data breaches occurring with many businesses as well as individuals. the most recent occurrence was with Yahoo who services millions of people's email accounts. These accounts were compromised by hackers in 2014, nearly 2 years ago, and prompted executives to issue a statement just last week that Yahoo users must quickly change their passwords in order to protect their sensitive data. But this was too little, too late. Why did Yahoo wait two years before reporting this breach? The damage has already been done and hackers have the information they need to commit even more identity theft crimes and cost tax payers billions of dollars. Why are big name companies like Yahoo, Home Depot, Target and others consistently falling into this trap? With identity theft on the rise, data security should be one of the top issues that companies should face head on.

So why isn't more being done to combat this issue? Perhaps some of it can be attributed to negligence and perhaps a lack of knowledge as well. Hackers can attack anyone at anytime and if you are not familiar with their techniques, you would never know until it's too late. Here are some techniques that hackers can use to access your personal information.

1. Phishing

This occurs when hackers create websites that are nearly exact replicas of commercial websites in order to get users to enter their information to access their site. They will commonly ask users to login or to email them their login information in order to capture their information. Some things to watch out for are misspellings in the URL or on other places in the site. Sometimes hackers will create an extra extension on the site that will seem out of place. For example Bank of America's website is www.bankofamerica.com not www.bankofamerica.cz or .info. Another red flag to consider is this-why would a company that you signed up with ask you to send that information to them again? Most companies would never have the time to do that. You would be better off just creating another account,

2. Spoofing

Hackers play on a user's curiosity to pull this one off. Typically users will be sent an email by an unfamiliar source asking them either open an attachment or click on a link in an email. No other information is provided in the email. Legitimate emails are not vague. A legitimate company would identify themselves or their representative by name or other contact information and they typically would not send anything to you without prior knowledge.

3. Downloading Free Software

This is also a ploy that hackers use to gain access. Usually this occurs with a pop-up message or by visiting a site that offers download of the free software. A common pop-up will inform the user that their computer is infected and that they would need to click on a button to remove the infection. Antivirus software does not work in this fashion and 99% of the time users have no idea that their computers have been infected. What really happens here is that programs like spyware and viruses are downloaded onto your system. These programs are capable of tracking and recording your passwords, all the websites you visit, your credit card information and your computer's IP address which hackers can access remotely without your knowledge.

4. Using Open Wi-Fi.

Wi-Fi is extremely convenient but can also present a problem if proper security measures aren't taken. Open Wi-Fi allows users to connect to the Internet without having to login. Savvy hackers can easily access your computer through this open network since there is nothing stopping them. The best bet is just to use secure Wi-Fi. You'll thank yourself later.


Report this Content
This article has not been reviewed by Odyssey HQ and solely reflects the ideas and opinions of the creator.
an image of taylor swift standing center stage surrounded by her backup dancers in elegant peacock esque outfits with a backdrop of clouds and a box rising above the stage the image captures the vibrant aesthetics and energy of her performance during the lover era of her eras tour
StableDiffusion

A three-and-a-half-hour runtime. Nine Eras. Eleven outfit changes. Three surprise songs. Zero breaks. One unforgettable evening. In the past century, no other performer has put on an electric performance quite like Taylor Swift, surpassing her fans ‘wildest dreams’. It is the reason supporters keep coming back to her shows each year. Days later, I’m still in awe of the spectacle ‘Miss Americana’ puts on every few days in a new city. And, like one of Taylor’s exes, has me smiling as I reminisce about the memories of the night we spent together.

Keep Reading...Show less
Entertainment

Every Girl Needs To Listen To 'She Used To Be Mine' By Sara Bareilles

These powerful lyrics remind us how much good is inside each of us and that sometimes we are too blinded by our imperfections to see the other side of the coin, to see all of that good.

80566
Every Girl Needs To Listen To 'She Used To Be Mine' By Sara Bareilles

The song was sent to me late in the middle of the night. I was still awake enough to plug in my headphones and listen to it immediately. I always did this when my best friend sent me songs, never wasting a moment. She had sent a message with this one too, telling me it reminded her so much of both of us and what we have each been through in the past couple of months.

Keep Reading...Show less
Zodiac wheel with signs and symbols surrounding a central sun against a starry sky.

What's your sign? It's one of the first questions some of us are asked when approached by someone in a bar, at a party or even when having lunch with some of our friends. Astrology, for centuries, has been one of the largest phenomenons out there. There's a reason why many magazines and newspapers have a horoscope page, and there's also a reason why almost every bookstore or library has a section dedicated completely to astrology. Many of us could just be curious about why some of us act differently than others and whom we will get along with best, and others may just want to see if their sign does, in fact, match their personality.

Keep Reading...Show less
Entertainment

20 Song Lyrics To Put A Spring Into Your Instagram Captions

"On an island in the sun, We'll be playing and having fun"

8662
Person in front of neon musical instruments; glowing red and white lights.
Photo by Spencer Imbrock on Unsplash

Whenever I post a picture to Instagram, it takes me so long to come up with a caption. I want to be funny, clever, cute and direct all at the same time. It can be frustrating! So I just look for some online. I really like to find a song lyric that goes with my picture, I just feel like it gives the picture a certain vibe.

Here's a list of song lyrics that can go with any picture you want to post!

Keep Reading...Show less
Chalk drawing of scales weighing "good" and "bad" on a blackboard.
WP content

Being a good person does not depend on your religion or status in life, your race or skin color, political views or culture. It depends on how good you treat others.

We are all born to do something great. Whether that be to grow up and become a doctor and save the lives of thousands of people, run a marathon, win the Noble Peace Prize, or be the greatest mother or father for your own future children one day. Regardless, we are all born with a purpose. But in between birth and death lies a path that life paves for us; a path that we must fill with something that gives our lives meaning.

Keep Reading...Show less

Subscribe to Our Newsletter

Facebook Comments