With cyber-crime being on the rise, the question of whether we are safe continues to mount. Last week a member of my family had her bank account depleted with unknown people. How and when they did it, we simply have no idea. This tells you how serious cybersecurity is. Everyone is at risk of being affected by cyber-crime, whether it is a direct or indirect attack. There is just no sure-fire solution that will guarantee your data is secure, but there are strategies you should know that these hackers use to gain access to your information.
Criminal or black hat hackers use many different strategies to cause physical, emotional, or financial harm, but being aware of this might help you prevent if not reduce the risk. One of the strategies used is that of Email phishing. This is a common strategy that has been there and is still used today. It involves email scams looking to trick email recipients into clicking a link that can install harmful software onto the recipient’s computer. If you have applied for a job online, then you must have encountered if not heard people complain of experiencing this. The other common method is the identity theft where criminals use personal identifying information (e.g., address, name, birth date, social security number, etc.) to sign up for credit cards, open bank accounts, or initiate other transactions using your personal information.
We also have cyber extortion, whereby hackers coerce victims to pay large sums of money when they take control of their website, servers, computers, or other digital assets and hold them hostage until their demands are met. You have seen these in most movies where they threaten to release pertinent government information if they are not given a certain amount of money within a certain period of time. But it also happens in real sense. Cyberbullying happens all the time, and not just too influential people or politicians who vie for a post during elections, but also to other citizens. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Understanding this, therefore, sensitizes you on the impending danger but also helps you put measures in place where necessary so as to prevent hackers from gaining access to your information.
Summary of the article by Meshack Mwaura
Zydii Software Developer