5 Common Hacking Tactics To Protect Yourself From

When many of us think of hacking, we typically think of someone furiously typing at a keyboard in a dark room. But how do hackers actually target their victims? It’s often not as complex as we imagine. By understanding the most common tactics, you can understand exactly why certain protective measures are needed and have a clearer idea of how to protect oneself. Below are just 5 common hacking tactics and the best defensive measures to use against them.

Phishing

This is when a hacker pretends to be someone you trust – such as your bank, the government, an insurance company, or even your friend – in order to trick you into paying them money or revealing sensitive information. It can be done via phone call, text or email. 

Phishing is not always easy to spot. In fact, some cybercriminals will go to great lengths to imitate someone you know such as copying their tone and using an almost identical email format. You should take caution with any email/text/phone call that seems demanding in tone or out of character. Check that the sender’s contact details match those you’ve previously been contacted on and consider contacting them back via another form of contact that you trust (if you get a suspicious email from a friend, consider ringing them up to confirm its legitimacy). 

Malware

Malware is malicious software that is downloaded onto your system. It is usually downloaded via an email attachment or by visiting a malicious webpage.

There are many types of malware that can each have their own malicious purposes including:

  • Adware: This type of malware bombards you with ads in order to persuade you to buy a product.
  • Ransomware: This type of malware encrypts or threatens to delete files in order to coerce you into paying a ransom.
  • Spyware: This malware tracks your activity which could include tracking cookies without permission, capturing your screen or even recording keystrokes to crack passwords.

You’ll usually be able to tell if you’ve got malware on your system because your computer will be acting slow. There could also be odd programs on your desktop, unusual pop-ups, strange browser redirects and dodgy adverts appearing on web pages. By taking careful steps to not click on suspicious emails or websites, you can usually avoid downloading malware (anti-virus software will provide warnings in most cases).

Network attacks

This is when a hacker tries to hack directly into a network to steal data. Hackers can also hack directly into accounts. This is usually done by guessing or getting access to a password.

Strong passwords can help to prevent this type of attack, while security features like firewalls can also help. Most businesses are encouraged to use managed cyber security services to help fend off network attacks. Make sure that you’re always using a secure network that you can trust.

Evil twins

These are networks set up by cybercriminals that are made to imitate public networks that you otherwise would trust. They may use the same network name or a similar name. Once logged onto this network, a cybercriminal can track and steal your data.

Always be cautious before logging onto a public Wi-Fi connection. If there are two or more similar named networks, ask someone (such as a member of staff) which is the correct one. Using a VPN is the best security measure you can take as it will create an encrypted tunnel so that no one else using the network can access your data. 

Fraudulent websites

Criminals can also set up fake websites and convince you to pay money through illegal payment gateways. These websites may be copies of websites you trust, or they may be websites posing as legitimate independent websites that take your money but don’t actually sell anything. Some may even contain malware or fraudulent ads.

If a website feels dodgy, it’s best to get off of it as soon as you can. Red flags to look out for include lots of spam adverts, unwanted re-directs, no SSL certificate, browser warnings and slow loading times. 

Leave a Reply