Top Techniques Cyber Criminals Use to Hack You (and How to Protect Yourself)
I am an “ethical hacker”, also known as a “white hat hacker” or a “penetration tester” which basically means that I am paid by various organisations to break into their computer systems. Once I succeed, instead of ruining their reputation, destroying their infrastructure, or stealing their money and assets, I educate them on their security vulnerabilities and help to remediate them before they are found by a malicious hacker.
If you’re not familiar with the idea of ethical hacking, just know that it is a legitimate career. Ethical hackers are hired every day by banks, universities, large companies, and even small businesses. Ethical hacking, and the whole information security sector, is becoming more of a necessity as cyber crime becomes more abundant in our society.
Now, before we start — let me be very clear. I have not and will not commit cyber crime, nor do I recommend it to anyone. It is illegal, unethical, and it could land you in jail. Nevertheless, for my work, I need to have an in-depth understanding of the techniques used by the bad guys to wreak havoc (and earn money). In this article I will be providing an insight into these techniques.
There is a very common attitude among the average internet user which I hear regularly: “I don’t have anything secret…