These days all our important transactions are happening on the Internet. While increasing connectivity around the world is making our lives a lot easier, its dangers have also increased that no hacker / cyber criminal should steal our personal information. Hackers now have many avenues through which they can steal our information and misuse them.
We are telling you six ways that your data can be stolen. We are also telling you how you can be safe.
1. Fishing
Phishing is actually a fraud email, with the help of which you are asked for data. This looks like the real one. Hacker tries to assure you through phishing emails that he is asking for bank account information or other data for your benefit.
For example, an email comes from your bank stating that your debit card has been canceled and a new card will be issued to you only after stating the card number or Aadhaar number. You may think that the bank has asked for this information from you, but it can be a hacker.
How is information stolen
There is a link in the phishing email on which you are taken to a fake web page. If you get caught in their deception, then you enter your account information there and it goes to the hacker's server. After this, the hacker can use these information to blow money from your bank account or credit card.
The second way is that you are sent an attached ment in an email, which is asked to download. As soon as you download it, and open it, a mail ware is installed in your system. This is a hacker's access to your device and data, allowing it to access your account.
Tips and information related to investment
How to stay safe
Note the spelling mistakes in the domain name or email address. Cyber Criminals generally use the kind of email that belongs to well-known companies, they just manipulate it a little to make it look genuine.
Think twice before clicking on any such link. If you see any suspicious email, do not click on it.
Cyber Criminals usually threaten you with a safety hazard. Do not fall into such a trap. Set your mind on the situation and then talk to your financial institution.
2. What is Mail Ware?
It is a software designed to steal information or data of a system. This program performs activities like stealing sensitive data, deleting it, changing the way the system works, and keeping an eye on the person working on the system.
This program can be installed in your system in many ways. An out-dated operating system or pirated OS, unintentionally clicking links, or installing fake software, may cause mail ware to be installed.
Spend but thoughtful, useful tips
How many types of mail ware
Virus: It is able to affect the functioning of the system from affecting any software. It is capable of transforming itself into a data file / program or boot sector. This makes it difficult to access the file / system by going to the computer's hard disk.
Trojan: It goes beyond your security system to create a back door so that a hacker can monitor your system. It shows itself like any software and is found in any tempered software.
Spy ware: This is designed to spy on you. It checks your online activity by hiding itself in the back ground. It reads your ID, password, credit card number and habit of running the net. It can record keyboard, video and microphone etc.
Key Logger: This is an alternative to Spy that records your keywords. These logs are sent to the attacker. With his help, the hacker gets your password, chat, credit card number or other information.
Solution to all your problems related to loan
How to be safe?
How to be safe?
Install good anti virus software
Do not download any fake software, through these mail ware can come into your system.
Never click on fake pop-ups of anti-virus
Always keep your system operating system updated.
Always avoid pirated apps or software. They may contain mail ware.
3. Mobile Apps
Not all apps on Google Play Store or Apple Store are safe. One, these apps ask you for permission to access all the data of the mobile so that the hacker can steal all your information and by having access to other messages / media files, it can also make your confidential information public.
Try not to give all this permission to any application
Account Access: This will protect your confidential data. These include email and contact list.
Permission for SMS: This will prevent sending SMS to the premium rate number and your balance will remain in the mobile.
Access to microphone: This allows you to record your conversation.
Device Admin Permission: Hacker can control your device even by sitting away from it. He can also do things like keep an eye on your work and blow all the figures.
Contacts: The hacker can steal this and harass your people, or sell this data.
Talk about tax related work, click
How to avoid
Check permission before downloading an app.
Pay attention to its reviews and ratings
Do not install apps with less than 50,000 downloads
Do not take app from third party app store
Do not download pirated / cracked apps
4. Mixing
What is smishing
This is also a way of phishing in which you give personal information to someone over the phone or sms. It is emerging as a new threat in the case of online security.
How is theft
By using social engineering, someone asks for your personal information and you give it to him. In this, information is taken from you using your trust. The attacker can ask you for anything from online password to bank account details or OTP / CVV. Once the data is received, he can use your information in many ways.
Many times these messages also come in small links, on which you have to give the necessary information on clicking.
Going to buy property? Some important things
How to be safe from it?
Do not give your confidential information over phone call or sms.
Before clicking on the link on any message, check it thoroughly.
If there is a message asking for data from the number of some information, then call and talk to them and ask why the information is needed.
5. Physical hazards related to safety
Taking your laptop, every disk or mobile and stealing confidential information from it actually comes in such danger.
It is considered to be of lesser importance than technical hazards. It is a case of extracting data from a stolen device and using it. This can happen anywhere, in your home or office.
How to avoid this danger?
Keep your information safe. If the computer / smartphone has this kind of information, then protect it with a password or pattern.
Do not get used to writing password.
Come out only after shutting down the system or logging out from the banking site.
Lock the phone.
If your device gets lost, in that case you can erase the data sitting at home, make such a system
6. Unsecured Network
Hackers can easily steal personal information of the customer using public Wi-Fi. The information that hackers try to steal include credit card details, password, chat message, email ID, PAN number, Aadhaar number and other information. It is commonly called Identity Theft. To protect your information, you should not do any activity like shopping or netbanking from these places.
How to be safe?
Do not do financial transactions with open internet network at all.
Make home Wi-Fi secure and keep passwords difficult.
Your safety is in your hands. Be careful and be vigilant at all times.
A hacker is watching your data all the time, so vigilance is the only protection.
Always remember this sutra - caution happened - accident happened.
The author is a director of the cyber security firm Human Fire Wall. The views expressed here are personal.
إرسال تعليق