By Ankush Johar Show NEW DELHI: These days most of our important transactions happen over internet. While an increasingly connected world makes our lives easier, it also poses great risk as we expose our personal data to cyber criminals or hackers. The hackers have devised numerous ways to steal important data which is then put to misuse. Below are six most common ways your data can be stolen and the precautions you can take to stay safe: 1. Phishing What is phishing? How it can it steal your data Another way is the email might have an attachment and asks you to download it. As soon as you click on the download button and open the attachment, a malware gets installed on your system giving the hacker complete access to your device and data. Discover the stories of your interestHow to stay safe Think twice before clicking any links. If you see a link in a suspicious email message, don't click on it. Instead, hover your mouse on the link to see if the URL matches the link that was provided in the message. Cyber criminals often use threats that your security has been compromised or your account has been blocked. Don’t fall for such tricks. Take your time to assess the situation. 2. Malware Major types of malware Trojans: This type of malware tends to create backdoors in your security to let attackers monitor your activities remotely. It disguises itself as legitimate software or is included in legitimate software that has been tampered with. Spyware: Spyware is malware designed to spy on you. It hides in the background and tracks everything you do online, including your passwords, credit card numbers, surfing habits and chats. It can record keystrokes, videograph you from your webcam and even listen from your microphone. Keylogger: This is a specific form of spyware that simply records the keys you type and where you type them. These logs are then sent to the attacker who can analyse them to find your passwords, chats, credit card numbers and much more. How to stay
safe 3. Malicious mobile apps How such apps can steal your data It is advised to look out for the following permissions as they can be misused by an application: Accounts access: It helps collect crucial data including contact lists and e-mail addresses. SMS permission: It can be used to send SMSs to premium-rate numbers and drain out your balance. Microphone access: It can record phone conversations. Device admin permission: It can help a hacker take remote control of your phone, track it live and even wipe it remotely. Contacts: It can help a hacker steal your contacts and sell it to ad networks. How to stay safe 4. Smishing How it can compromise your
data How to stay safe? 5. Physical security
threats A physical threat is any threat to your sensitive information that results from other people having a direct physical access to your devices like laptops, hard drives and mobile devices. Physical security threats are often underestimated in favour of technical threats such as phishing and malware. Physical device threats occur when someone is able to physically gain access to your confidential data like data gathered from stolen devices. Physical security breaches can happen at your workplace or even at your home. For example, someone could get hold of your confidential files that they are not supposed to see or access an unattended system which is not password-protected. How to stay safe Never leave your system unattended. Always protect it with a strong password. Don’t leave your phone unlocked and unattended. Make sure proper backup and remote wipe services are enabled in case you lose your device. 6. Insecure networks Connecting to a “free” airport/coffee shop WiFis is dangerous especially when you are carrying out critical activities online such as banking, private conversation or even browsing your email. These networks are often left unprotected which can allow a malicious hacker in the same shop/region to snoop on you easily. How to stay safe If you are using a public Wi-Fi, avoid performing any bank transactions or accessing any critical information while being connected. Your security is in your own hands. Stay cautious and alert at all times. Always remember, someone, somewhere is trying to hack you and basic security practices mentioned above can protect you from most hacks. (Ankush Johar is Director of HumanFirewall.io, a cyber security solution provider. This article is from our Cyber crime special series 'Dangers of Living in a Connected World' ) (Disclaimer: The opinions expressed in this column are that of the writer. The facts and opinions expressed here do not reflect the views of www.economictimes.com.) Stay on top of technology and startup news that matters. Subscribe to our daily newsletter for the latest and must-read tech news, delivered straight to your inbox. What type of malware collects information?Types of Malware
Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses. Adware displays pop-up advertisements when you are online.
Which malware is used by hackers?Computer worms have been replaced by Trojan malware programs as the weapon of choice for hackers. Trojans masquerade as legitimate programs, but they contain malicious instructions.
What are the 3 types of malware attacks?What Are the Most Common Types of Malware Attacks?. 1) Adware.. 2) Fileless Malware.. 3) Viruses.. 4) Worms.. 5) Trojans.. 6) Bots.. 7) Ransomware.. 8) Spyware.. Which malware works by capturing information and sending it to an attacker?Spyware Example:
Once that access was gained, the attackers installed keyloggers to capture their targets passwords and other sensitive information.
|