There are many television shows, cable series, as well as action and spy movies that, over decades, have shown us how easily you can hack into a computer, laptop, or cellphone and get information in minutes! With most of the viewers believing “of course, that’s fake, it’s just movies and television scripts”.
In reality, most of what happens in those movies and television shows are true. From hacking cellphones on “Person of Interest” and full identity theft in “The Net” to the surveillance like in “Enemy of the State” to just about all the hacking done on “Mr Robot”, all of these types of hacks are real. Since these types of attacks are out there, the average ‘user’ of these technological products and services should be educated as to how they can protect and secure themselves from being hacked.
There are many liabilities that are being exploited daily such as Network Threats, Wireless Threats, Social Networking Threats, and many others. Not everyone works at a big company with an IT department to mitigate and manage these on a daily basis. There are many small businesses and home offices that can be easily hacked if these vulnerabilities are not addressed.
As an example let’s look at Wireless Threats. First of all, any sort of unlocked and free wifi access, of course will not be secure and will be susceptible to attacks and viruses. When you go to a business that has Free Wifi and you connect your cellphone or laptop to their network (or some devices are set to Auto Connect), now you are also able to get the same attacks and viruses onto your system, which you can now spread to your home office or other systems.
A second example, let’s look at Social Networking Threats. There are many types of Social Threats that you may have already experienced such as Clickjacking. This is when a social website you visit, may have a script that activates when you Click on something, called a 1-Click, or simply activates when you move your mouse over a designated area of the screen, called a 0-Click. Once this script activates it may create annoying pop up adds, or redirect you to another website.
I will be reviewing and explaining many different types of these forms of exploits, in separate blogs that I will be writing.