Are You Unhackable?
Working in cybersecurity doesn’t make you immune to hackers, but it sure does make you more aware and more prepared.
One of the biggest things to remember is to always be skeptical. Skeptical of strange email addresses, random friend requests, unfamiliar Wi-Fi networks…everything. Learn the signs to look for and the things to avoid.
And listening to Hackable? will help.
Being Protected While Staying Connected
We created Hackable? to shed some light on the various ways our lives can be infiltrated in the digital world. Many people don’t realize the countless areas hackers can exploit to gain access to their personal lives – and most don’t realize how easily it can happen. The good news, though, is that staying proactive can help keep you protected.
In a world where we get and stay connected, we’re constantly looking for resources to take our connectivity to the next level. We download apps and install software, store personal information and approve location sharing on our devices. All the while, not considering who might be trying to access what we’re putting out there. What many don’t realize is that malicious code can be written by hackers and attached to downloadable content with the sole purpose of damaging or disabling your computer or device.
As technology has advanced, so have hackers. They’ve gotten better at stealing information and doing so undetected. We wanted to share their secrets, so we invited some of the world’s smartest cyber experts to show us the ins and outs of hacking. We revealed their objectives and tactics in order to help you recognize the signs and stay alert.
Our podcast kicks off by revealing how the familiar task of choosing a Wi-Fi network in a public place might get your personal information stolen, introducing listeners to what we, in the cyber-world, call an “Evil Twin Access Point.” This rogue wireless access point appears legitimate so that an attacker can gather information without the user’s knowledge. Other episodes demonstrate how easy it is to hack into someone’s webcam via a RAT (Remote Access Tool), which gives hackers a backdoor to access your laptop’s camera and microphone with ease. Or how a simple Google search can uncover personal information that can then be used to access your devices and data.
With episodes that reveal how hacker’s think and operate, we expose their tricks and schemes to help keep you more safe and secure.
Each episode of Hackable? gives consumers an inside look at the technology we use every day – testing how safe we really are when using it. Plus, we dig into the details of how each hack goes down, and give away hackers’ secrets, letting you know what to watch for to stay out of their path.
More antivirus and malware news?
- Carriers say smartphone ‘kill switch’ attractive to hackers
- ITS Streaming will be unavailable on 5/20/2015 during maintenance window
- Apple threatened to oust Uber from App Store for ‘fingerprinting’ iPhones
- SDN switches aren’t hard to compromise, researcher says
- Microsoft Internet Explorer CVE-2015-0036 Remote Memory Corruption Vulnerability
- WordPress SPAM Causing Headaches
- Wi-Fi patent troll will only get 3.2 cents per router from Cisco
- Detecting Targeted Attacks With SPuNge
- Researchers find data leaks in Instagram, Grindr, OoVoo and more
- Scheduled Network Services Maintenance