Hackers

233 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
233
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hackers

  1. 1. Hackers Our Worst Nightmare
  2. 2. Hack-er: a person who uses computers to gain unauthorized access to data. (Wikipedia)
  3. 3. • Hackers spend enormous amounts of time trying to breach the security of networks, webservers, and email servers. • Specialized software is utilized to identify weaknesses, which are then exploited
  4. 4. 5 Terrible Things Hackers Can Do To You • 1) Cut your car’s breaks – Security specialists at the University of Washington have shown that new cars with computer systems on board can be susceptible to a hacker gaining complete control of the vehicle. • 2) Use your computer screen as a two- way mirror – Getting access to a webcam is easier than you think in fact, there are sites devoted to unsecure webcams that have been already hacked.
  5. 5. • 3) See you naked – Full body scanners at airports can be hacked very easily. Last year image were leaked from an airport scanner so privacy breaches are currently a current threat. • 4) Hack your email – According to abc News email hijacking could be the prelude to identity theft
  6. 6. • 5) get your credit card info- are you surprised? – The most commons and one of the most devastating things a hacker can do is to steal your credit card information for financial gain. – Approximately 15 million United States residents have their personal information stolen and used fraudulently each year. On a case by cases basis losses average to 3,500. How common is it? This Forbes article provides a great example.
  7. 7. Tips to Consider • Schedule a scan to occur every week or so on your realtime anti-malware software, during the night or at some time your computer isn’t being used. • Make sure the virus definitions for your software are up to date before a scan. Most software updates itself, but it’s good to check. • Most firewalls have what are called “Security Prompts”, which will pop up when an unknown process begins. If you have initiated a program or some action on your own, then for the most part it’s ok and you can accept it. If you have not, block it.
  8. 8. Sources TinHat.com

×