Click me
Transcribed

How To Protect Yourself From Hackers

Where You'll Get НАСКEВ Common Mistakes, and How to Prevent It. Cyber-security threats are increasing. As more and more devices become internet capable, it's important to understand current trends in security threats, identify vulnerabilities in your internet security, and protect your data against threats. DATA TARGETED What are the hackers after? The primary data type targeted by attackers in 2012, as in 2011, was cardholder data. 98% Stolen payment card data are used in fraudulent transactions. PAYMENT DATA Confidential Information Electronic Protected Business Financial 2% & Intellectual Property 1% Health Information (EPHI) Account Numbers Identity theft is the reason why hackers go after personal information. There were 12.6 MILLION victims in the last year. That's 1 victim every 3 seconds! $21 BILLION was lost to identity theft in 2012 of all American households are victims 7% of identity theft. Financial loss per household is approximately A$4,900 HACKER CHECKLIST Usernames, passwords, Bank and credit Professional license and PIN numbers. card account numbers V numbers Employment and student ID numbers Insurance identification Social Security numbers numbers Phone and utility College or university V financial aid information Drivers license account numbers and passport numbers METHODS OF ENTRY How did the hackers find me? Hackers have lots of different ways to steal your private data and information. THE TECHNICAL TERMS 47% 26% 18% 3% REMOTE SQL REMOTE CODE ACCESS INJECTION UNKNOWN EXECUTION Remote access SQL Injections take advantage of improper coding of your website and These cases where Remote Code Execution allows hackers to method of entry is allows hackers to access data or unknown had weak execute commands and/or default on your server from a remote location. resources from a remote location. steal data. credentials. 2% 2% 2% 1% 1% CLIENT-SIDE REMOTE FILE USER AUTHORIZATION PHYSICAL ATTACK INCLUSION INTERACTION FLAW THEFT Client-side attacks Remote File User Interaction An authorization Physical theft is when the thief has physically taken private property. ike a computer or credit exploit the trust relationship flaw lets remote un-authenticated Inclusion allows depends on the user hackers to include to interact with a between a user a remote file specific element in users access files and trigger malicious attacks. and the websites through a script on order to access data. card to access data they visit. the web server. and resources. SOCIAL NETWORKS Social Media sites are subject to user interaction hacking because you use personal data on your profiles that make you vulnerable to an attack. 16% of students became victims of a controlled phishing scam, but a whopping 72% were victims when they believed it was their friend who sent them the fraudulent link. 68% of people with public social media profiles shared their birthday information 63% 18% shared their high school name shared their phone number All of this personal information 12% shared their pet's name could be used to steal your identity! HOME WIFI HOTSPOTS A hacker can remotely access your network A hacker can create their own when within range and steal your private data hotspot and disguise them under the and personal information. WPA-2 encryption names of airports, coffee shops, is your best line of defense. But and other public places. 19% 89% of internet users still of public Wi-Fi hotspots use WEP encryption are unsecured MALICIOUS WEBSITES Hackers use SQL injection to collect personal information from user's form filed inputs. Websites loaded with offers and fake search results are full of malware that allow hackers to download your private data and personal information. E-Commerce sites account for MALWARE 48% ADD TO CART of all attack investigations. EMAIL Attackers do their research, collect your contacts' email addresses, and the "From" field is changed so it appears to come from someone you know. To: You 10% From: Your Friend I MALWARE of spam messages are malicious 7% of spam messages contain a link to a malicious website DETECTION How are the hackers caught? Attacks have grown significantly in complexity, rendering the majority of "off the shelf" detection solutions, like antivirus programs, ineffective. Additionally, malware often goes unnoticed by systems administrators despite being clearly visible to investigators. 48% 25% Regulatory Detection Law Enforcement Regulatory detection combined with defense techniques are still most likely to fight off hackers. Law enforcement agencies are committed to identifying and disrupting cybercriminals. 24% Self-Detected Remain aware of your own security and you'll Tikely detect and report the intruder yourself. DEFENSE How can I protect myself? PASSWORD SECURITY More than 60% of people use the same password combination on multiple sites. Create a strong and unique password by using combinations of upper and Don't use easy to guess passwords like lower case letters, characters, and numbers your dog's name or birthday! BROWSER SECURITY 44% https://www of people did not know how to protect their private information. Do not share your personal information unless LOG OUT When you don't log out , you're giving authorization to snoop. you are using a secure connection (HTTPS in the URL), and always log out of your accounts. NETWORK SECURITY On Windows, disabling AutoRun can stop *MALWARE 50% 85% COMPLETE of Malware threats Default network security settings allow hackers to get into your computer. Always customize your security settings to protect your network. Malware often comes in the form of a download you didn't notice happening. WIFI SECURITY Home wifi Change your home router's default settings by enabling a non-default password and network name. Use WPA-2 encryption protocol (the strongest security protocol for for wireless networks). Public wifi Disable sharing and use a VPN service to prevent any breaches in security. especially when using internet away from your home network. Use a VPN Service to Secure Your Internet Connection VPN (Virtual Private Networks) conceals your IP address and secures your data by encrypting your internet traffic. • Protects your privacy online • Encrypts all your data and information • Prevents online spying • Prevents hackers from stealing your data Your Computer Secure Hackers can't Websites see IP Tunnel steal your data VPN Server of VPN, not yours. Hotspot Shield Powered by AnchorFree Hotspot shield VPN service enables you to surf the web anonymously and securely, protecting you from hackers, malware, and identity theft. Get hotspot shield for free at www.hotspotshield.com. Sources http://www.ic3.gov/media/annualreport/2012_IC3Report.pdf http://securityevaluators.com/content/case-studies/routers/soho_router_hacks.jsp http://www.techrepublic.com/blog/security/dropsmack-us ing-dropbox-to-steal-files-and-deliver-malware/9332?tag=nl.e1018s_cid=e101&ttag=el01 https://media.blackhat.com/eu-13/briefings/Williams/bh-eu-13-dropsmack-jwilliams-wp.pdf http://lifehacker.com/5938980/how-secure-are-you-online-the-checklist http://www.splashdata.com/press/PR121023.htm http://www.zdnet.com/blog/security/survey-60-percent-of-us ers-use-the-same-password-across-more-than-one-of-their-online-accounts/9489 2013 global security report https://we.riseup.net/riseuphelp+en/how-vpn-works

How To Protect Yourself From Hackers

shared by wclquang on Aug 12
7,153 views
20 shares
1 comment
Hacking attacks are increasing. To make matters worse, hackers can use many ways, from low tech methods to sophisticated techniques to steal your private data and information. The main reason why h...

Tags

None.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size