• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TECHi

Fresh daily technology news

  • Mobile
  • Technology
  • Gadgets
  • Apple
  • Google
  • Offbeat
  • Gaming
  • Microsoft
  • Lifestyle
TechEngage » Technology

New ways hackers are stealing your identity

Avatar of Sandra Baker Sandra Baker July 29, 2013

Hacker Guy

Hacker Guy

As you read this, hackers everywhere are hard at work trying to obtain your personal information and steal your identity. It’s scary, but it’s also a common part of today’s online landscape.

With cyber crime in mind, here are some new ways hackers are infiltrating your online world and taking what they want.

 

Malware is everywhere

Granted, malware isn’t the new kid on the block by any means, but hackers are finding new ways to hide malicious malware programs from detection. The newest forms of malware essentially lie dormant while anti-virus software updates and searches for threats.

Malware that goes undetected long enough will eventually retrieve and log your various passwords, even those passwords from concealed login sites. Not only that, once malware successfully enters your system, it’s capable of leaving your entire network vulnerable to other cyber criminals on the hunt.

 

Hacking via social engineering

Social engineering is a form of hacking that uses the human manipulation approach by way of email and direct phone call phishing. Email phishing comes in the form of a hacker posing as a legitimate company requiring personal information via email.

Phone phishing, on the other hand, is much more brazen, and involves the cyber criminal acting as a company representative by calling and speaking directly with the victim to acquire personal information.

A recent form of phone phishing that’s gaining in popularity is similar to the technique above, except the cyber criminal poses as the customer and contacts companies in the hope that phone representatives will release customer information to them.

 

Social network scouting

One way to avoid falling victim to id theft is by simply not revealing too much information about yourself on social media sites. Hackers browse profiles looking for identity tidbits that could help them crack your passwords.

So, don’t let the world know what your favorite websites are — especially if you have accounts with those sites. Also, never discuss subject matter related to your passwords.

For example, if your dog’s name is Skip, and every password you have involves the name Skip, don’t talk about your dog Skip via social media, or better yet, come up with a stronger password.

 

Wi-Fi hackers are waiting

Open wireless networks are like open doors and windows for hackers trying to infiltrate your online life. And, considering any information transmitted on an open network is up for grabs for anyone within network range, more and more hackers are turning to this “fish in a barrel” method of online theft.

Likewise, joining open wireless networks at coffee shops, libraries, and any other designated Wi-Fi area is yet another way for hackers to gain access to anything you happen to do on your laptop, which includes logging into personal information.

Because not using Wi-Fi isn’t an option, the best thing to do is avoid accessing sensitive information while on a public network. When it comes to Wi-Fi at home, make sure others need a password to join. Take it an extra step further and enable MAC filtering.

Hackers come up with new techniques everyday, so it’s important to stay informed on the newest tactics to avoid being a victim.

Related Tags: Anti-Virus Computer crime hacker malware Personally identifiable information Social engineering (security) social network wi-fi

Related Stories

  • Lasers could be used to erase combat wounds

  • Network Solutions has been hacked

  • Japanese scientists have created a way to record chemical reactions

Avatar of Sandra Baker

Sandra Baker

Sandy Baker is a published author who is passionate about delivering the latest in virtually any news. Her work focuses around personal finance, health, and even some technology thrown in from time to time.

Reader Interactions

Join the Discussion
  1. Avatar of ZombinolZombinol says

    July 30, 2013

    Nothing remotely new here

    Reply
  2. Avatar of Lavneet SharmaLavneet Sharma says

    July 31, 2013

    Thanks for the information. One more thing that I would like to add is “viruses” that are spreading like real human viruses and stealing serious information of victim.

    Reply
  3. Avatar of Energy saving tipsEnergy saving tips says

    August 6, 2013

    This is useful topic, keylogger very dangerous for our information, i often scan and check this issue to make sure my data are safe.

    Reply

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or publish anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Recent

  • Swedish companies are leading the charge on autonomous vehicles
  • Google and Huawei might be working on a new tablet
  • Apple is purging hundreds of thousands of apps from the App Store
  • Can video games help autistic children improve their social skills?
  • Chicago tried and failed to use big data to predict crimes

Things to do on TECHi

Reviews – Browse Product Reviews
Deals – Checkout latest Tech Deals
News – 24x7 Technology news
Tech Guides – Technological How to Guides

Copyright © 2023 · All Rights Reserved · TECHi™ - Fresh daily technology news, editorials and reviews.
Techi® is a registered trademark in United Kingdom under Trademark Number UK00003417167.

  • About us
  • Advertising
  • FAQs
  • Disclaimer
  • Contact us