Page 31 - revista2019-final_Neat
P. 31
PROTECT YOUR PRIVACY AGAINST HACKERSROTECT YOUR PRIVACY AGAINST HACKERS
PROTECT YOUR PRIVACY AGAINST HACKERSPROTECT YOUR PRIVACY AGAINST HACKERS
P
In this modern world, information plays a major role among peoples. Information is a powerful
weapon to knock a person. In this article I am going to tell how to protect privacy yourself against
hackers.
People mostly leak their privacy through mobile phones. So first you must defend your mobile phones
against unwanted peoples.
“
“The most valuable commodity I know of is information” The most valuable commodity I know of is information” --Gordon GekkoGordon Gekko
“The most valuable commodity I know of is information” “The most valuable commodity I know of is information” --Gordon GekkoGordon Gekko
ANDROID SECURITY TIPS
First of you must not install any apps from third party websites.(eg: pirates bay).because they can bind
malwares into an app. This malwares can leak your privacy without your permission.
You must not install app that contains lower size especially app name called “main activity”. This app
contains malwares to leak your privacy. This app may be created by beginner hackers.
Many top levels hackers can bind malware app into normal app. That may so complicated to identify
it. Even one can identify by scanning through antivirus to avoid such nonsense.
If your mobile is automatically heating try to reset your mobile.This heating happens due to unwanted
apps that may running on background.
Never show or tell your public IP to anyone because hackers can do penetration testing to find
vulnerable to access a connection to your mobile.
“A small leak can sink a great ship”A small leak can sink a great ship”
“A small leak can sink a great ship”“A small leak can sink a great ship”
“ - Benjamin Franklin
S SOCIAL ENGINEERING ATTACKOCIAL ENGINEERING ATTACK
SOCIAL ENGINEERING ATTACKSOCIAL ENGINEERING ATTACK
Social engineering attack is used to collect all your information through social media like instagram,
facebook etc. there are various types of social engineering attack
PHISHING METHODHISHING METHOD
PHISHING METHODPHISHING METHOD
P
Mostly hackers try to steal your username and passwords without your knowledge by using fake login
page. Phishing page project like real original login page. The only difference between original and
phishing page are website URL.
For example: if phishing page ask you to login your instagram id. If you have entered your username
and password in fake login page means Your username and password would be shown to hackers.
P
Prevention:revention:
Prevention:Prevention:
1. You must not click any links that forwaded In social media.
2. You must always login in an official website.
3. Before login check URL of website for clear clarification.
Richard ClarkeRichard Clarke
“If you spend more on coffee than IT security, then you will be hacked. “ Richard ClarkeRichard Clarke
P
PASSWORDSPASSWORDS
PASSWORDSASSWORDS
18

