Friday, 31 August 2018

Top 5 Reasons To Fear Hackers

Thousands of hackers from all across the world go to Las Vegas each year for the Def Con and blackhat, which are security conventions where those who attend are warned not to send any confidential information across their wireless networks.

It’s traditional for computer hackers to showcase all their best exploits at these conventions, which ultimately leads to a ton of press attention, creating awareness to exploits that others were previously unaware of.

In this article, I’ve decided to list 5 reasons why you should be wary of computer hackers in today’s society.

Hacker


1. They can use GoPro to Spy on You

Imagine going mountain biking with your GoPro device attached to your helmet, oblivious to the fact that someone has hacked into it and can now spy on your every move. Professional and amateur video makers love to use the GoPro portable video camera, because of its internet connectivity. But this one feature that makes the device appealing is its biggest vulnerability.

Hackers have worked out tons of different ways of exploiting the GoPro device, with methods of controlling it and recording what is being displayed on the device. This could prove to be a serious security risk for military personnel who decide to use such cameras while on duty.


2. Hackers Love Lazy People

You should never be afraid to be that individual that has tons of different passwords but chooses to remember them instead of using one of those password managers. The safest place for your passwords is in your head. If you were to use one of these password managers, like LastPass, then it’d be in your best interest to ensure that the passwords are not stored in a cloud or on the internet.


3. Mobile’s Map Your Every Move

There was a security researcher that went by the name of Brendan O’Connor, who planted sensors all across a city, for the cost of $60 per sensor. These sensors were used to track signals, including mobile devices and cell phones, sending all this data back to a central database which mapped the signals. Because most people tend to travel around with at least their mobile phone, it meant that the sensor was able to track their every move.

This device went by the name of CreepyDOL, which wasn’t the most intriguing thing about it. The most intriguing thing was the fact that his project was government funded, and these sensors were just one of many ways that you can be monitored while out and about.


4. You’re Not Invincible

Even if you’re a careful individual, that doesn’t mean you can’t fall victim to one of these hackers. Even the best of them get hacked. Phishing seems to be one of the most common ways that even the most experienced computer users are hacked, by receiving emails that appear to be as authentic as can be.

The more intelligent scammers tend to think long term, they’re thinking about their gain over a considerable length of time. Hackers will steal credit card numbers, but the theft of such data has its short-term benefits and long-term. In the long term, they’d hope to use such information to steal one's identity.

You don’t want to fall into the trap of thinking your invincible. It’s this thought that can make you fall prey to one of these hackers; you want to be cognizant of all the things these people can do.


5. They Can Hack Your Vehicle

Car hacking, over the years, has become a very big trend. Hackers are capable of breaking into your vehicle using remote access and then tweaking things that are under your dashboard. You could be driving somewhere only to find out that your brakes are not working, or your wheels start acting up, or your fuel tank indicator is showing your fuel levels are full when in reality it’s empty.

A security research at Twitter was able to showcase these feats, just to let others know how real and terrifying this stuff actually is. If you visit one of these Def Con security conventions, then you should get an up close and personal demonstration of these vehicle hackers, and how they can adversely affect you.

Definitely, something you should be aware of, given the fact that these hacks are applicable to more and more cars.

This is a guest post written by Uchenna Ani-Okoye for Mazinoweb.com. Uchenna is a former IT Manager who now runs his own computer support website (http://www.compuchenna.co.uk). You can connect with him on social media (Facebook, Twitter, and Google+)

No comments:

Post a Comment

Comments with spammy links will not be published. If you have questions unrelated to this post, use the contact page.

The content of this blog is strictly copyrighted to mazinoweb.com and may not be reproduced without permission.

Designed by Mazino Oyolo Kigho