Home » today » Technology » Slang Children must be vigilant, habits that make you a victim of hackers

Slang Children must be vigilant, habits that make you a victim of hackers

Jakarta, CNN Indonesia

In addition to hacker threats such as Bjorkaa series of public data leaks occurred recently in mid-2022. Indeed, cyber crimes committed by hackers like Bjorka’s hacker have occurred among the public and even the government.

To protect yourself, it’s important to remember best practices to reduce the chances of identity theft.

Some people don’t realize they have bad habits that can increase the risk of identity theft like Bjorka’s hacker.

ANNOUNCEMENT

Swipe to resume content

If you like to go out together in bars or restaurants, you need to be careful. There are some habits you don’t realize that make you vulnerable to being a victim of hackers.

Unknowingly, you could leave yourself open to attack or take unnecessary risks.

Here are the bad computer habits that can expose you to some serious consequences in the real world Norton.

1. Use the same password for all important accounts

They would need passwords to access emails, bank accounts, social media, apps, streaming sites, and so on. Some people decide to use the same password for every account.

In fact, a fifth of all cybercrime victims use the same password across all accounts, and 58% share at least one device or account password with others.

Using a single password can be convenient, but it can make your account insecure.

Photo: Life-Of-Pix / Pixabay
Illustration of drinking coffee in a cafe-

2. Use public Wi-Fi networks carelessly

“Madam or madam, what’s the password?” Do you often ask this to restaurant or bar employees?

Public Wi-Fi networks may seem safe, but you never know if they are safe or not.

If there is an “unsecured” or unsecured Wi-Fi network that allows you to connect without a password or hotspot access, that network is suspicious.

A common threat of Wi-Fi networks are Man-in-the-Middle attacks, in which attackers intercept the information you send or receive.

You can also use an unencrypted network, which means anyone can intercept the signal. This allows you to pass on everything you do to the criminals.

The rule of thumb is to stick to the security of public networks. But keep in mind that even a “secure” network is not necessarily secure. Malicious hotspots can impersonate legitimate networks by using trusted names to trick you into connecting, allowing attackers to access sensitive information.

Avoid using public networks to shop online and don’t log into bank accounts, sensitive personal data, or social media accounts using public Wi-Fi.

3. Don’t be wary of strange messages or attachments

If you receive an unsolicited email or message from someone you don’t know, think twice before opening it.

A common phishing tactic is to send someone an attachment or link that contains some sort of malware (malicious software that can infect your device) or a Trojan, often with a seductive headline or message designed to make you click on it. .

Messages can sometimes come from the account of a friend or family member who has been hacked or compromised. So if you get a suspicious message or link from someone you know, it never hurts to contact them to make sure it’s safe.

4. Lazy to change Wi-Fi or modem passwords

Many people don’t really consider their Wi-Fi or modem passwords at home. In fact, changing the Wi-Fi password itself is a must.

It is tempting to leave the default password or the default password. After all, the default passwords commonly found under modems usually look like very strong passwords. The reality is that these passwords can be found easily.

5. Leaving yourself unprotected

No one ever expects to be the victim of a cyber attack, but one way to avoid it is to take some basic precautions.

The most important thing to avoid is getting caught online. This is especially true of your phone, which can hold a treasure trove of confidential information in email and other applications.

Take a moment to think about what you put on your phone. For example, private photos, bank account logins, and private conversations that may be accessible to anyone with access. Things like that make you vulnerable to being a victim of hackers like Bjorka hackers.

(del / chs)

[Gambas:Video CNN]


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.