{"id":105,"date":"2021-11-05T12:26:08","date_gmt":"2021-11-05T12:26:08","guid":{"rendered":"https:\/\/aiguru.mcqtimes.com\/?p=105"},"modified":"2021-11-05T12:26:08","modified_gmt":"2021-11-05T12:26:08","slug":"20-security-secrets-hackers-dont-want-you-to-know","status":"publish","type":"post","link":"https:\/\/aiguru.mcqtimes.com\/index.php\/2021\/11\/05\/20-security-secrets-hackers-dont-want-you-to-know\/","title":{"rendered":"20 security secrets hackers don\u2019t want you to know"},"content":{"rendered":"<p>Hackers are the bane of our existence. What started as the occasional data breach has turned into thousands, if not hundreds of thousands, of scams, ransomware and heinous attacks. Nobody is safe.<\/p>\n<p>While anyone could be a victim to hackers, that doesn\u2019t mean you can\u2019t protect yourself. There is an entirely separate market out there for programs and devices designed to keep you from getting hacked. Sometimes the answers are simpler than investing in fancy products. Here are five essential steps to take to protect yourself from hackers online.<\/p>\n<p>Information is power, as they say. So the best thing you can do is arm yourself with knowledge. Here are 20 security secrets that hackers don\u2019t want to know about.<\/p>\n<p><strong>1. Oversharing on social media<\/strong><br \/>\nWe post everything on social media. Bad idea! Avoid oversharing the following information, and whatever you do, stay away from using basic information to create passwords.<\/p>\n<p>The best way to protect yourself here is to create a strong password. Do so by using a combination of letters, capital letters, numbers, and symbols. Avoid using common names and phrases in your passwords or any personal information. Tap or click here for five new rules to creating the best passwords.<\/p>\n<p><strong>2. Photos with inside looks of your home<\/strong><br \/>\nThis is simple enough. Think before you post. Pictures of your home office sometimes catch images of your computer screen. This can easily give hackers what they need. To really ensure hackers can\u2019t take advantage of your photos, double-check your privacy settings.<\/p>\n<p><strong>3. Eerily similar emails<\/strong><br \/>\nSome of the most successful scams come through emails. Some tend to think emails are harmless, but they have the potential to become a huge hassle. Look for any subtle signs that emails are spoofed. Often the email addresses and links are very close, but a single digit is off.<\/p>\n<p>It\u2019s never a good idea to reply to unsolicited emails with banking or personal information. If you need to conduct business with a company that you normally deal with, contact them directly. Also, don\u2019t click links or open attachments found in unsolicited emails. They could be malicious and infect your device with malware.<\/p>\n<p><strong>4. Your boss needs your personal information immediately<\/strong><br \/>\nJust like emails that are made to look super similar to, say, your bank, in hopes of tricking you, the same goes for your company. They may even know specifics about your boss and your job role.<\/p>\n<p>If you receive a message that\u2019s supposedly from your boss or company\u2019s HR department asking for personal information or even company funds, don\u2019t fall for it. It could be a BEC or spear-phishing attack. Tap or click here to see how BEC scams work.<\/p>\n<p><strong>5. They prey on your emotions<\/strong><br \/>\nThe IRS scam call is a great example of this. If you don\u2019t pay them now, they will issue a warrant for your arrest immediately. Everybody is scared of the IRS.<\/p>\n<p>Sometimes the scammer will claim a loved one is in jail and demand you cover the bond money they have to pay. It\u2019s another play on your emotions as you must act now. This manipulation works well on loved ones. These types of scams often target the elderly. Don\u2019t let them pressure or scare you.<\/p>\n<p><strong>6. Your router doesn\u2019t have security<\/strong><br \/>\nWeak passwords on your accounts are bad ideas, but they are just as dangerous on your router. You should follow the same password rules for your banking information and other secure sites on your router.<\/p>\n<p>Protect yourself from hackers with a sophisticated password and don\u2019t share it with anyone.<\/p>\n<p>Don\u2019t know how to create a QR code for your Wi-Fi network? No worries, we can help. Tap or click here to find out how to share Wi-Fi without giving out your password.<\/p>\n<p><strong>7. Your smart appliances aren\u2019t secure either<\/strong><br \/>\nEverything in our homes nowadays can be a smart device. Thanks to Amazon\u2019s Alexa and Google Assistant, we can control devices with our voice, making us want to get more smart devices. From your coffee makers to your Wi-Fi-connected light sources, one compromising device can give a hacker access to your entire network.<\/p>\n<p>How do you fix this? Enable two-factor authentication (2FA) for smart devices whenever possible to limit security breaches. This is especially important when purchasing security cameras for your home. You don\u2019t want hackers to have access to those! Tap or click here for more info on 2FA.<\/p>\n<p><strong>8. Not updating passwords on your outdated accounts<\/strong><br \/>\nOur first email accounts had passwords like myredcat. That was thought to be fine at the beginning of the internet, but it doesn\u2019t cut it anymore. If you haven\u2019t updated those old passwords, hackers can easily gain access to those accounts.<\/p>\n<p>Your old accounts likely contain personal information that hackers can use to get access to more current accounts. Always keep your passwords strong and update and delete old accounts you never use. Myspace anyone?<\/p>\n<p><strong>9. They pretend to be buyers<\/strong><br \/>\nCraiglist and programs like OfferUp and Facebook Marketplace are popular because they are so convenient.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are the bane of our existence. What started as the occasional data breach has turned into thousands, if not hundreds of thousands, of scams, ransomware and heinous attacks. Nobody is safe. While anyone could be a victim to hackers, that doesn\u2019t mean you can\u2019t protect yourself. There is an entirely separate market out there [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":0,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiguru.mcqtimes.com\/index.php\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}