WHY TARGET ME ?
Why would anyone want to hack my computer ?
It may be tempting to think that because you do not have secret documents on your computer or because your online interests are so boring, no one could possibly be interested in what you are up to. However it is not safe to assume that you have nothing of interest to a hacker. Your computer will most probably hold many pieces of a puzzle that once put together can put at risk something that is extremely valuable; your identity.
Identity theft is on the increase and most of us wouldn't realize what a nightmare scenario that someone stealing your identity can be unless it has happened to you or someone you know. At risk is your money via credit cards and bank accounts, your credit rating and reputation and maybe your sanity as you try to regain control of your identity/life!
These are a few things you be extra vigilant about.
- Do NOT use the same password for many sites. If someone cracks one of your passwords, the first thing they'll be trying it on is your financial sites, so at least make sure your bank account passwords are unique.
- Change your Passwords reasonably regularly.
- A strong password will have a combination of letters, both upper and lower case, numbers, and possibly symbols such as colon, asterisk or whatever the site will accept - so long as you can remember it!
- Develop your own code for remembering and creating passwords. Perhaps it could be part of a poem you know very well, or the first letters of a well known saying ( perhaps with punctuation ).
- It is less secure to allow your browser to remember your passwords. If someone gains access to your computer, the passwords stored by your browser are too easily cracked.
- With all the passwords you are required to remember these days, a Password Manager is a viable option for keeping your vital information safe. Password Managers.
- If you choose not to use a Password Manager, then another option is to store your passwords in a simple text file (such as a notepad or wordpad file), call it by some innocuous, unlikely name, and store it in an equally innocuously named file somewhere on your hard drive. While the information won't be encrypted, at least it won't be quite so obvious.
- Remember, most sites which require you to register/log in will have a "forgotten your password" option for you to reset your details using a secret question or other security feature.
Password stealing is a key method in online identity theft but not the only one. Also of interest to internet thieves is other personal details and data
ACCOUNT FRAUDAlmost anything can be purchased online from just about any country to just about any country. If a thief manages to gain control of your payment mechanism, the possibilities for them are enormous, and can only be detrimental to you.
Credit Card usage
Every time you use your credit card on line you are giving the site that you are buying from a lot of potentially dangerous information if it were to be used fraudulently. If you have not purchased from them before, at least make sure you know with a high degree of certainty their security is tight. Hackers are very interested in credit card numbers and internet payment accounts such as paypal etc. Many warez groups will use a stolen credit card number to purchase software then distribute the stolen software key to others online. Trojan makers are slowly moving away from coding malware for free and are moving into the arena of making malware for profits.
Use secure sites and trusted vendors. Look for https, (which represents a secure http site), the small padlock down the bottom right hand corner of your browser, and/or a "secured by" logo, such as SSL COMODO.
Consider setting up a secure payment account, such as through Paypal.
BANDWIDTHBroadband technology has given hackers more scope when it comes to bandwidth theft. A hacker can set up an ftp server on an infected victims system and upload a heap of pirated software then publish the address around the internet. These warez dumps and pubstros as they are known can cost an victim in bandwidth.
Process manager, Startup manager, Firewall, Malware scanner.