Account Hacking is a very big problem for every internet user. Internet has become a technological tool of great value in the life of every day, which allows for example to carry out banking operations in minutes or to directly pay for items online without leaving the chair.
A major computer attack has hit dozens of countries since Friday, raising concern among security experts. It is operated with malware called WCry, WannaCry, WanaCrypt0r, WannaCrypt or Wana Decrypt0r. Here are some tips to fight against these “ransomwares” that promise to release your data against the payment of a ransom.
Most of the time, the so-called “malware” software infects the computer via an e-mail. The individual or company receives an email containing an infected attachment that it opens without care. In order not to create distrust among the recipients, e-mails often appear to come from known or even credible senders such as the entourage or a public institution, a bank, service providers, etc.
Once the attachment is opened, it is already too late. The virus spreads throughout the system and encrypts it. In the case of an individual, the impact is limited. On the other hand, as soon as the victims are companies or institutions, the consequences are more serious. Because the software can block the system and monopolize the data of the target company.
During this cyber attack, the ransom was 300 dollars, to be paid in bitcoins. A modest amount, but it involves hundreds of thousands of computers in the world. The strategy of ransomware is often the same: it is to capitalize on the effect of mass.
These practices, however, are subject to risks including that of hacking account. What are the different account hacking techniques used by hackers? What are the means to protect ourselves from being attacked?
Account hacking techniques
Malicious Internet users have different techniques to take control of any other user accounts or private information for their own use. Some of them are mentioned below :-
One of the most used account hacking techniques is phishing. Most of the time, hackers pose as a authentic public or bank official and ask you to provide personal information (account number, Credit card number etc.) by visiting a web page linked in the message. This page is actually a fictitious site used to steal the information provided bu the end user. Hackers will finally have ample opportunity to mis-use the data collected.
Another technique is to use a virus. A malicious program is sent to your computer, such as an attachment in an email, which will run once the attachement is opened. This virus can save data from your computer without getting detected, such as bank information.This information after saving is transfered back to the hacker. Hackers also look for passwords that protect different accounts.
The Wi-Fi networks
A privileged playground for hackers is the Wi-Fi networks of public places , which they infiltrate to enter private accounts of the connected user. The Wi-Fi network of a bar or a store does not have the same security as a private network, so it is easier for hackers to steal sensitive information from people connecting to it.
How to protect your account from Hacking?
How to deal with this kind of behavior? There are a number of tips to follow and adopt to better protect the user’s computer and account, from simple identification.
In phishing, several clues help to identify dangerous emails or fictitious websites: most of these messages contains errors For eg spelling mistakes or errors on the logo , on the site, the domain also includes irregularities. It is close to the actual domain name, but may be different from one character. Above all, remember that, in general, public and banking institutions will never ask you to enter personal data via email. The object entered in these messages is also a good indicator of fraudulent attempt; do not be bluffed by believing that there is an urgent problem on your account which can be settled by providing yours confidential data.
Antivirus and security software
For safely navigation on the Internet without exposing risk to your computer, it is highly recommended to install an antivirus or security software. This will be a defense against viruses that may try to infiltrate your computer and helps in reporting it directly or removing malicious programs. Generally, these software scan your computer regularly , in search of possible threats and fix it by elimintaing it.
A very simple advice that can enhance the security of accounts is to make an effort on passwords; they must be complex enough to avoid being found or easily hacked by malicious users. It is strongly advised not to use personal information such as password (name, favorite movie, birthday date).
This information is easily retrievable, especially on social networks. Also try to avoid basic passwords like “12345”, they are very easy to guess. Wherever possible, it is best to use a different password for each account, lengthy and unpredictable, with a mixture of different characters (letters, numbers, special signs ). In all cases, even if you are using complicated password , do not log into your bank account, or any other sensitive account via a public Wi-Fi network.
Enable 2-step authentication
To enhance the security of your account, some messengers implement an authentication system in 2 stages (or strong authentication). If you enable this option, you will receive SMS security code on your mobile phone every time you login to your mail from an unknown device. You will need to enter this code in order to access your messages. This approach is a bit restrictive, but very effective .
Fight against piracy
If you’ve ever been the victim of one of these techniques or want to know how to defend yourself legally against these attacks, here are some ideas. If you witness any of the suspicious attack , you need to complain directly to the police station. The penalty of hacking is up to 3 years imprisonment and a 45,000 dollars , which could vary depending on the damage and scale of piracy.