While you are reading this, thousands of devices worldwide are getting hacked/infected with malware and malicious applications which have been designed by cybercriminals. These cybercriminals have decided to create an income from hacking into environments which are not their property. Once these cybercriminals gain access to the properties, they start searching for information which they can use or sell.
The information is often sold on dark net markets which allow the cybercriminals to share their loot on a marketplace. The marketplaces often ask a revenue from the cybercriminals, in exchange, the marketplace provides an bulletproof environment for the cybercriminals to perform their sales and buys.
So if you wonder on how you are getting spam messages while you have not signed-up for a weird service, then the chance is pretty high that a product which you are using has been hacked by the cybercriminals. The cybercriminals have sold your email information on the dark net, and some buyer is now using it to lure you into a malicious environment or scam – as you can see, the circle is complete.
FireFox, Chrome and mobile/social applications
Cybercriminals are regular people like you and me, only they have decided to earn their money by using illegal techniques and methods, so to get back to the fact that these cybercriminals are people, we will have to take a look at the devices and environments which are being used.
The hackers often use a Linux operating system, this allows them to stay secure against a lot of malicious codes which are crawling the internet for victims, it also allows them to stay on track of each application or code that is processed, now that is something which we do not see a lot when we take a look at Windows users.
The Windows users are targeted more often because the applications which run on Windows are in a majority, and that means that it is a good target for cybercriminals to focus on. The cybercriminals will develop fake or modified Windows applications, these applications are loaded with malware which allows the cybercriminals to control the infected device, but it is not only the Windows environments which they target — the cybercriminals also create fake social media and mobile applications to lure unaware users to malicious environments. We have listed various Fake Facebook applications here, it is possible that some of the Facebook scams are still active, so stay vigilant.
How to delete spam posted by malicious applications
It is possible that your social media environment is infected by malicious applications — I am talking about your friends or family members which are active on Facebook — these (unaware) people are allowing the cybercriminals to earn a online revenue by performing illegal activities.
In the “How to delete spam posted by malicious applications” post we explain how you can clear your own personal Facebook account from malicious applications, but it also allows you to help your friend or family member to get a clean Facebook account. Make sure that you do help the people which are in need of support.
Your Facebook account
Millions of people are using Facebook on a daily basis, the information which is being shared on the social media platform is valuable for a lot of parties. These parties can be cybercriminals, government agencies or angry boyfriends/girlfriends/parents/employers and so on. In the “How To Prevent People From Hacking Your Facebook Account” we have taken a look at the factors which allow hackers to obtain Facebook credentials. The posts takes a look on the public places factor and the total Facebook environment.
Your social media accounts
Now it not only Facebook which might get you hacked, there are other social media networks like Twitter and LinkedIn which are being targeted and monitored by the earlier mentioned parties. In the “Perfect guide on securing your social media accounts” post, we have taken a look on how to secure your Facebook, Gmail, LinkedIn and Twitter account. The post explains how to use Two Factor authentication and extra featured security options.
Your Personal information on Facebook can be downloaded with one simple click
Did you know that the Facebook social media network allows you to download your full profile data which has been stored by Facebook?! In the Perfect guide on securing your social media accounts post you will see how you can simply extract your Facebook data from the social media network.
The chance is high that you are using a mobile device or a computer to read this post, but did you know that cybercriminals own thousands of random websites which try to infect unaware and unprotected internet users? The cybercriminals own websites which infect the targets with exploits (dangerous codes) without alerting the device user. The cybercriminals target old and out-dated applications like Adobe, Chrome, Internet Explorer and FireFox.
So it is very important to use security applications which add an extra layer to your private environment and devices.
Follow these simple tips to make it VERY hard for hackers to hack your devices:
- Update your Smartphone with the latest updates
- Update your operating system with the latest updates
- Do not use the root or administrator account on a daily basis
- Do not install hacking or illegal software on your mobile or computer
- Do install an anti-virus application
- Do enable PIN code or biometric security options on your mobile
- Do enable a strong password for the Administrator and common user account on your Computer
Internet of all Things (Your brand new TV)
The current technology allows the cybercriminals to target niche markets like TV’s with WIFI and internet connections. The cybercriminals might use the webcam option in your TV to record a live stream and use it against you. It is also possible for them to install malicious code on your TV which demands you to pay a specific amount of ransom before you are allowed to use your TV again.
In the “Me, Myself and My TV that spies on me” post we have described how it is possible for cybercriminals and government agencies to control your smart Television for their own purposes. It is a must read post which brings light in the age of espionage.
Do you have tips?
Now this has been a post on the most common targets which cybercriminals use, but it is impossible to list all the vectors which they attack, and we need to remind ourselves that the weakest security link is always the human vector. So they only way that we can arm ourselves against these cybercriminals is to stay aware, vigilant and up to date with the latest techniques which are being used by the cybercriminals.
If you have more tips, then please leave them in the comment section. I am sure that there are wonderful tools and tips available which have not been listed in this post.