Hacking, Computer Hacking and Password Protection in a layman’s language
In this article, we will explain what is meant by hacking, computer hacking and ethical hacking? In simple words, we can say it is a technique through which someone gets the access to your computer/laptop/tablet/phones without the owner authorization. A hacker can achieve this through various methods. Most common forms of computer hacking are stealing someone’s email address, Wi-Fi password, Facebook. Stealing Bank Account details .etc. This can be achieved through the different method. Installing some software on to your computer. e.g, you may receive an email stating that your computer required an update and click on this link to update your computer or certain programme installed on your computer.
How to avoid Hacking!
You can use various simple methods to safeguard yourself being a victim of this attack. Mostly, people have a misconception that they need to be a master of computer and information technology to avoid hacking. You can use following precautions to keep yourself safe from computer hacking.
You must always be very careful whenever you update your computer or any machine. As all companies continuously enhance their applications/programmes, they send the updates and it provides the opportunity for hackers to take advantage.
A hacker may send you malicious codes hidden within files. As you install or update the programme, the hacker would get the access to your machine or whatever he wanted to achieve, will get that information. To avoid this, before you click on download or update any programme, make sure that you read thoroughly who the sender of that notification or email is. Check the email address and try to compare it with programme provider’s details.
Most, people use a very weak password and the reason is that it is very hard to remember a long and complication password. A good password should normally be a minimum of 8 characters and should consist of alphabets in lower and upper case, numeric and special characters in it. There is not a 100% guarantee but this will put even a professional hacker in some trouble to decode your password. It is also recommended that password should be changed after every 6 months and you should not share anyone.
Check Websites and Other Web Sources
We are always very careful with our credit card or debit card details when we go out for shopping and take out money from the cash machine. We try our best that no one can see our pin number or any other card details. But, do we do the same precautions online? Whenever you using a credit card online, see the website first. Is it secure? What kind and type of security codes, they use for security. Any company or website which takes payment online must be PCI Compliant.
Wi-Fi / Wireless Network Access
Nowadays, it is very common that we get free Wi-Fi in public places and restaurant. Always be very careful when you are using these kinds of networks. It is an open invitation to the hackers anyone one can get connected to your device and you are more open to the risk. If you are using the internet where you have free Wi-Fi, please do not open any sensitive data. Secondly, from time to time, check your Wireless router connections that which devices are connected to your router. Your neighbor or someone from the street can get connected to your router and do something illegal.
Protection against Phishing scams
It is also a very common and most famous method of hacking someone’s bank account details. Phishing scams are fabricated emails mimicking the contents of any website. For example, you may receive an email with instructions to follow a link that will lead to a deception site. The goal of this malicious threat is to steal your sensitive data like login details, passwords and pin numbers. The deceptive website looks identical to your banking website but the URL will be different and it will be very similar to the original website. You may get caught in it unless you really pay attention that deceptive website address carefully.
Example: Your bank’s URL: www.citibank.com (citibank.com domain)
Deceptive site URL: www.citibank.24.com (24.com domain)
The hackers will try to create such type of website address that looks very similar and most people will think it is genuine because they are not paying attention.
Logging off /Signing Out of Accounts
This is a very common mistake and we all must have done it in our life and some of us, are still doing it. Always remember, whenever you Sign-In/Login on any device, always make sure that you are using the secure internet connection and secure device. You should also log out when you finish your work. Remember, on some website, closing the internet browser without signing out does not mean that you will be automatically logged out. Re-opening the browser by anyone else can give full access to your account.
Read Terms & Conditions
You should also remember that before paying any amount, or proceeding to the payment/check out, always read company’s terms and conditions.
There are companies which will automatically in the script you for some kind of subscription. In most of the cases, these companies will offer you a free subscription for certain time period. You will be charged for the subscription after the free trial period. We all are in the habit of not reading the terms and condition, they might sell something under the table.
Installing and regularly updating anti-virus definitions is very important. Anti-viruses are designed to detect and eliminate all potential threats. These include viruses, malware, and illegal port penetrations.
What is Ethical hacking
Ethical hacking means you hire a professional programmer and request them to hack their website. This gives the website owner an opportunity to enhance the security of their website. An ethical hacker will bypass system security. He will search for weak points in the system which is exploited by bad hackers. This information gives an opportunity to improve the system security and make an effort to minimize or eliminate any potential attacks.
What establishes ethical hacking?
The hacker must respect and obey the guidelines below:
An ethical hacker must have written expressed permission from the company to hack the network or website.
An Ethical Hackers must respect the individual’s or company’s privacy.
The Ethical Hacker must close out their work. He should not be leaving anything open to exploit at a later time.
At the end of his task, the Ethical Hacker must tell companies developers developer or hardware manufacturer know of any security vulnerabilities that he found in their software or hardware or website, if not already known by the company.
Please do let us know if you have been the victim of the attack by clicking here.
Other useful resources: