In computer networking hacking is any technical effort to manipulate behavior of network connections and connected system. It’s also called malicious attacks on computer network which is often done through scripts or other network programming. These programs generally manipulate data passing through our network connection in ways designed to obtain more information about how the target system works. Many such pre packaged scripts are posted on the internet for anyone typically entry level hackers to use. More advanced hackers may study and modify these scripts to develop new methods. A few high skilled hackers work for commercial firms with a job to protect those companies’ software and data from outside hacking. Hacking is an act of finding a clever solution to the programming issue. Hacker is a clever programmer.
Computer virus is any kind of code that’s designed to harm the system and which also spreads itself. They are created by malignant computer programmers who might want to use your computer to attack the targets or make money by stealing your personal information.
There are many kinds of viruses which can harm windows, MAC, Linux, etc. There are many virus programmers who tend to hit upon the problems but many of the times the hacking lessens their ability. Many countries have remarked and experienced about thousands of viruses which advance online. The operations of virus have fetched those debts, trouble and shrinkage in the productivity and durability of the system’s abilities. Some viruses spread really quickly, some affect a lot of people, some create a ton of damage all by themselves and some create all of the above. It’s difficult to pick up which one is objectively the worst.
But here is one of those extremely destructive viruses which are sniped of codes that changed the way people thought about computers security both the people designing viruses and the people trying to protect against it:
It spreads through Microsoft outlook’s email programme .It was able to infect computers because of something called a Macro. A macro is a specific kind of computer program that’s used to create shortcuts. In word used to make editing in a document instead of manually bringing changes in the document one by one, a macro is a piece of code that lets you do it all with one click. In few days Melissa spread to thousands of computers. It didn’t do any damage to the computers themselves but it did make Email services slow way down and cost companies about $80 million overall. Melissa spread quickly because of social engineering. It was designed to make so curios enough to attract people to open the attachment.
In Russia hackers were arrested for having stolen more than 25$ million from banks and financial institutions in the country through way of hacking. San Fancisco’s story tells us that, in the public transit agency, 2000 of the computer systems were infected with Ransomware virus which led to the aftermath of free rides. Virtually 250 million computer systems were infected globally all inclusive all pervading by Fireball malware.
As the much-publicized proverb goes “Prevention is better than cure”. Hence we all must take measures in order to protect ourselves from being the victim of these cyber attacks. Here go few rules that may help you:
Rule 1: Update everything
Use newest version of your operating system. Make sure your antivirus software and the browser you are using is of the newest version too.
Rule 2: Encrypt data
The encryption would obstruct the third party from accessing your computer. Otherwise a thief could rip the drive off and insert into another computer and access it. Don’t forget your password. Encryption services in Mac and Window are by Fireball and Bitlocker respectively.
Rule 3: Back up data in a secure location
Once a hacker takes hold of your computer he can have access to your personal data and then you have to pay them in order to get it back. They rip you off of your data. For example, Wannacry ransomware.
Rule 4: Put strong passwords
Do not have the same usernames and passwords everywhere. Keep a tool to keep your passwords memorable and safe. Change your passwords every 3 months. Avoid using your names and birthday as your passwords.
Rule 5: Lock down your social media accounts
Hackers can easily take the information that you share online to use against you. This information is very powerful when someone is trying to steal your identity.
Rule 6: Check your Credit cards.
Check your credit card accounts on a weekly basis. Be sure to know what credit card you carry in your wallet. Update to the newest.
Rule 7: Social security
Do not share your social security information with anybody or any site.
Rule 8: Public internet.
Be extremely cautious while using a public internet because that may let a stranger have access to your personal details.
Rule 9: Avoid phishing.
No institution would ask your credit or debit card details on phone or email so be cautious. Check the site has https and lock icon.
Rule 10: Get an annual credit report
To be sure that no one haxs set up any account with you on your security number you must go through your annual credit card report.
Rule 11: Shred documents
Do not throw your documents with your details in the garbage. Take care of your precious details.
Cybercrimes have locked many businesses and individual’s compromises recently. Viruses could also be spread with just a click at a link from your facebook or Gmail or any social media accounts. There are viruses that spy on the system or website users. There are also viruses that can secretly snoop into your webcam and mic like Mac Malware. Some names of the recently spreading viruses are Ransomware malware, wannaCry ransomware, Mac malware, Fireball malware etc.