Page 31 - revista2019-final_Neat
P. 31

PROTECT YOUR PRIVACY AGAINST HACKERSROTECT YOUR PRIVACY AGAINST HACKERS
                                          PROTECT YOUR PRIVACY AGAINST HACKERSPROTECT YOUR PRIVACY AGAINST HACKERS
                                          P

                   In  this  modern  world,  information  plays  a  major  role  among  peoples.  Information  is  a  powerful
                   weapon to knock a person. In this article I am going to tell how to protect privacy yourself against
                   hackers.

                   People mostly leak their privacy through mobile phones. So first you must defend your mobile phones
                   against unwanted peoples.

                   “
                    “The most valuable commodity I know of is information” The most valuable commodity I know of is information” --Gordon GekkoGordon Gekko
                   “The most valuable commodity I know of is information” “The most valuable commodity I know of is information” --Gordon GekkoGordon Gekko

                   ANDROID SECURITY TIPS

                   First of you must not install any apps from third party websites.(eg: pirates bay).because they can bind
                   malwares into an app. This malwares can leak your privacy without your permission.
                   You must not install app that contains lower size especially app name called “main activity”. This app
                   contains malwares to leak your privacy. This app may be created by beginner hackers.

                   Many top levels hackers can bind malware app into normal app. That may so complicated to identify
                   it. Even one can identify by scanning through antivirus to avoid such nonsense.

                   If your mobile is automatically heating try to reset your mobile.This heating happens due to unwanted
                   apps that may running on background.

                   Never  show  or  tell  your  public  IP  to  anyone  because  hackers  can  do      penetration  testing  to find
                   vulnerable to access a connection to your mobile.

                    “A small leak can sink a great ship”A small leak can sink a great ship”
                   “A small leak can sink a great ship”“A small leak can sink a great ship”
                   “                                  -  Benjamin Franklin


                   S SOCIAL ENGINEERING ATTACKOCIAL ENGINEERING ATTACK
                   SOCIAL ENGINEERING ATTACKSOCIAL ENGINEERING ATTACK

                   Social engineering attack is used to collect all your information through social media like instagram,
                   facebook etc. there are various types of social engineering attack

                    PHISHING METHODHISHING METHOD
                   PHISHING METHODPHISHING METHOD
                   P

                   Mostly hackers try to steal your username and passwords without your knowledge by using fake login
                   page.  Phishing page project like real original login page. The only difference between original and
                   phishing page are website URL.

                   For example: if phishing page ask you to login your instagram id. If you have entered your username
                   and password in fake login page means Your username and password would be shown to hackers.

                   P
                    Prevention:revention:
                   Prevention:Prevention:

                   1. You must not click any links that forwaded In social media.
                   2. You must always login in an official website.
                   3. Before login check URL of website for clear clarification.
                                                                               Richard ClarkeRichard Clarke
                   “If you spend more on coffee than IT security, then you will be hacked. “ Richard ClarkeRichard Clarke






                   P
                   PASSWORDSPASSWORDS
                    PASSWORDSASSWORDS
                                                             18
   26   27   28   29   30   31   32   33   34   35   36