Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?
4. HOW DO HACKERS
GET YOUR INFORMATION?
sortthroughyourpersonal
computerortrash60% hackorscam
youwhileonline25%
stealyour
wallet15%
clickona
spamlink19%
disclosefinancial
informationbyaccident3%
THOSE WHO GET THEIR
INFORMATION STOLEN
5. TACTICSFORHACKINGUSERACCOUNTSONLINE
BAITING
someone gives you a usb drive or other
electronic media that is preloaded with
malware. Plug it into your computer
and you’ve given them the backdoor to
your personal information!
CLICKJACKING
concealing hyperlinks beneath
legitimate clickable content which,
when clicked, gets you to download
malware or perform actions
CROSS-SITESCRIPTING
malicious code is injected into a
website you trust
DOXING
publicly releasing a person's
sensitive, identifying information,
typically retrieved from social
networking site profiles
6. SOCIALENGINEERING
strategic use of conversation to
extract information from people
without giving them the feeling
they are being interrogated
PHARMING
redirecting users from legitimate
websites to fraudulent ones for
the purpose of extracting
confidential data
PHISHING
usually an email that looks like it is
from a legitimate organization or
person, but actually contains a link
or file with malware
SPOOFING
deceiving computers or users by
hiding or faking one's identity.
Email spoofing utilizes a fake
email address or simulates a
genuine email address
TACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
7. HOW MANY
ACCOUNTS HAVE
BEEN COMPROMISED
IN SINGLE ATTACKS
100,000,000
NETFLIX
18,000,000
WORDPRESS
6,500,000
LINKEDIN
1,500,000
VISA&MASTERCARD
600,000
DAILY
FACEBOOK
450,000
YAHOO
250,000
TWITTER
120,000
UNIVERSITIES
24,000,000
ZAPPOS