By Ankush Johar Show
NEW DELHI: These days most of our important transactions happen over internet. While an increasingly connected world makes our lives easier, it also poses great risk as we expose our personal data to cyber criminals or hackers. The hackers have devised numerous ways to steal important data which is then put to misuse. Below are six most common ways your data can be stolen and the precautions you can take to stay safe: 1. Phishing What is phishing? How it can it steal your data Another way is the email might have an attachment and asks you to download it. As soon as you click on the download button and open the attachment, a malware gets installed on your system giving the hacker complete access to your device and data. Discover the stories of your interestHow to stay safe Think twice before clicking any links. If you see a link in a suspicious email message, don't click on it. Instead, hover your mouse on the link to see if the URL matches the link that was provided in the message. Cyber criminals often use threats that your security has been compromised or your account has been blocked. Don’t fall for such tricks. Take your time to assess the situation. 2. Malware Major types of malware Trojans: This type of malware tends to create backdoors in your security to let attackers monitor your activities remotely. It disguises itself as legitimate software or is included in legitimate software that has been tampered with. Spyware: Spyware is malware designed to spy on you. It hides in the background and tracks everything you do online, including your passwords, credit card numbers, surfing habits and chats. It can record keystrokes, videograph you from your webcam and even listen from your microphone. Keylogger: This is a specific form of spyware that simply records the keys you type and where you type them. These logs are then sent to the attacker who can analyse them to find your passwords, chats, credit card numbers and much more. How to stay
safe 3. Malicious mobile apps How such apps can steal your data It is advised to look out for the following permissions as they can be misused by an application: Accounts access: It helps collect crucial data including contact lists and e-mail addresses. SMS permission: It can be used to send SMSs to premium-rate numbers and drain out your balance. Microphone access: It can record phone conversations. Device admin permission: It can help a hacker take remote control of your phone, track it live and even wipe it remotely. Contacts: It can help a hacker steal your contacts and sell it to ad networks. How to stay safe 4. Smishing How it can compromise your
data How to stay safe? 5. Physical security
threats A physical threat is any threat to your sensitive information that results from other people having a direct physical access to your devices like laptops, hard drives and mobile devices. Physical security threats are often underestimated in favour of technical threats such as phishing and malware. Physical device threats occur when someone is able to physically gain access to your confidential data like data gathered from stolen devices. Physical security breaches can happen at your workplace or even at your home. For example, someone could get hold of your confidential files that they are not supposed to see or access an unattended system which is not password-protected. How to stay safe Never leave your system unattended. Always protect it with a strong password. Don’t leave your phone unlocked and unattended. Make sure proper backup and remote wipe services are enabled in case you lose your device. 6. Insecure networks Connecting to a “free” airport/coffee shop WiFis is dangerous especially when you are carrying out critical activities online such as banking, private conversation or even browsing your email. These networks are often left unprotected which can allow a malicious hacker in the same shop/region to snoop on you easily. How to stay safe If you are using a public Wi-Fi, avoid performing any bank transactions or accessing any critical information while being connected. Your security is in your own hands. Stay cautious and alert at all times. Always remember, someone, somewhere is trying to hack you and basic security practices mentioned above can protect you from most hacks. (Ankush Johar is Director of HumanFirewall.io, a cyber security solution provider. This article is from our Cyber crime special series 'Dangers of Living in a Connected World' ) (Disclaimer: The opinions expressed in this column are that of the writer. The facts and opinions expressed here do not reflect the views of www.economictimes.com.) Stay on top of technology and startup news that matters. Subscribe to our daily newsletter for the latest and must-read tech news, delivered straight to your inbox. Which type of malware enables a hacker to collect personal information a user enters?Spyware, on the other hand, is a type of malware designed to gain access and damage your computer. Spyware, on the other hand, collects user's information such as habits, browsing history, and personal identification information.
When a hacker steals personal information with the intent of impersonating?When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as. malware theft.
When a hacker discovers a security hole that can be exploited in software that is unknown to the software vendor it is an example of?When a hacker discovers a security hole in software that is unknown to the software vendor, it is an example of: phishing. sniffing. zero-day vulnerability.
Which of the following is an example of data security?Examples of data security technologies include backups, data masking and data erasure. A key data security technology measure is encryption, where digital data, software/hardware, and hard drives are encrypted and therefore rendered unreadable to unauthorized users and hackers.
|