Your SlideShare is downloading. ×

Hackers

91
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
91
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Hackers Our Worst Nightmare
  • 2. Hack-er: a person who uses computers to gain unauthorized access to data. (Wikipedia)
  • 3. • Hackers spend enormous amounts of time trying to breach the security of networks, webservers, and email servers. • Specialized software is utilized to identify weaknesses, which are then exploited
  • 4. 5 Terrible Things Hackers Can Do To You • 1) Cut your car’s breaks – Security specialists at the University of Washington have shown that new cars with computer systems on board can be susceptible to a hacker gaining complete control of the vehicle. • 2) Use your computer screen as a two- way mirror – Getting access to a webcam is easier than you think in fact, there are sites devoted to unsecure webcams that have been already hacked.
  • 5. • 3) See you naked – Full body scanners at airports can be hacked very easily. Last year image were leaked from an airport scanner so privacy breaches are currently a current threat. • 4) Hack your email – According to abc News email hijacking could be the prelude to identity theft
  • 6. • 5) get your credit card info- are you surprised? – The most commons and one of the most devastating things a hacker can do is to steal your credit card information for financial gain. – Approximately 15 million United States residents have their personal information stolen and used fraudulently each year. On a case by cases basis losses average to 3,500. How common is it? This Forbes article provides a great example.
  • 7. Tips to Consider • Schedule a scan to occur every week or so on your realtime anti-malware software, during the night or at some time your computer isn’t being used. • Make sure the virus definitions for your software are up to date before a scan. Most software updates itself, but it’s good to check. • Most firewalls have what are called “Security Prompts”, which will pop up when an unknown process begins. If you have initiated a program or some action on your own, then for the most part it’s ok and you can accept it. If you have not, block it.
  • 8. Sources TinHat.com