Hacking into the hacker

Emily Tran and Vanessa Lopez

No need to learn coding to realize how vulnerable a device is without any degree of protection.
556 Forensics
No need to learn coding to realize how vulnerable a device is without attentive care.

Hackers are more threatening than what people would presume about these computer nerds. To understand their mindset, it is time to hack the hacker.

First, their motive is not to simply steal passwords. If they are able to breach through an online account, then for the most part, they might have access to the network you are using at that time. With that, they can go as far as secretly using your camera to scout you and your surroundings.

Even if there is nothing interesting on your computer besides the log in to the ancient account of Myspace, the hacker can use your hacked system to hack another system, and another system. According to Seton Hall University, that situation can go like this: “if the hacker attacks a military computer, the military will see the attack from computer A, the owners of computer A might look and see that they were hacked by computer B, the owners of computer B were hacked from computer C, and so on.” When a landslide like that happens, it will be difficult to track down the hacker’s original position.

Sometimes, hackers are not that aggressive. It is possible for them to simply take advantage of a hacked network and sap some of your internet for themselves, which will ultimately affect everyone else on the network. Ever wonder why your webpage is not loading as fast as before?

It is time to hack into their method. In simple terms, when hackers can find a weakness in the operating system, they can gain access to that computer — such as when they have login information. That is the reason why they yearn to collect as many passwords and IDs as they can, and according to Seton Hall University, they tend to trade these contents with each other.

In order to take greater precautions, CNN suggests enabling the two-factor authorization, where some websites such as Facebook and Google requires the extra step in authorization — whether it be a code sent to the mobile device or a confirmation email — when someone logs in using a foreign device.

CNN also advises to cover camera lenses with tape or a post-it note when not in use just in case there is a hacker monitoring your interesting or boring life.

Software can also play a major role in lowering the risk of hacker infiltration. For example, antivirus programs like Zone Alarm, Norton, and Kaspersky have features that scan your computer, install firewalls, and inform you of dangerous websites. If you do not have an antivirus program installed, your systems are welcoming places for unwanted visitors.

The internet is not necessarily safe for all users, just as how neighborhoods are not the same in all areas. Install an antivirus software to create a harder time for a hacker to breach through your devices. Yes, there are antivirus apps for mobile devices too. Source: http://blogs.microsoft.com/blog/2013/04/17/latest-security-intelligence-report-shows-24-percent-of-pcs-are-unprotected/
The internet is not necessarily safe for all users, just as how neighborhoods are not the same in all areas. Install an antivirus software to create a harder time for a hacker to breach through your devices. Yes, there are antivirus apps for mobile devices too.
Source: http://blogs.microsoft.com/blog/2013/04/17/latest-security-intelligence-report-shows-24-percent-of-pcs-are-unprotected/

Other tips are a given, such as creating abstract passwords, meaning that your password should not be “password.” There should be a combination of letters, characters, and numbers, so even “[email protected][email protected]” is decent.

Also, system updates should not be avoided, even though many of us are guilty in pressing the “Postpone” button without mercy. The update is there for a reason; when a company discovers a weakness in the system, they create a solution and bundle it all up in the next update. Thus it is highly recommended to sacrifice five minutes of updating in return for greater protection.

Finally, be careful with what you are downloading, and do not click on random advertisements. To fend off the evil ads, you can download extensions and software, such as Adblock, that specialize in blocking ads.

Let the event of Sony’s files being exposed by hackers remind you to be better aware of your systems, especially in a world where almost everything is connected to technology and networks. Remember that one wrong click can “byte” you.