Archives - Hacking


Delete any social media accounts you aren’t using

If you have multiple profiles on platforms like Facebook and Twitter, it might be advisable to consolidate them. Old platforms might contain personally identifying information you forgot to take down. Plus, they could be secured with weak passwords that you never got around to upgrading. Fewer accounts means less exposure to hacking as well as […]

Change your passwords after a data breach

Strong passwords are among the best defenses against account hacking. Regularly changing them provides additional protection. If you receive a notification about a data breach affecting one of your accounts, that’s a good occasion to update all your passwords and also implement two-factor authentication if possible.

Set up two-factor authentication on your most important accounts

Complex passwords provide excellent protection against hacking – but what if someone intercepted them? To reduce the risk of password theft, set up two-factor authentication on sensitive accounts. This feature requires anyone requesting access to supply an extra credential, such as a code sent to a separate device, to log in.

Cyber crime never pays

Although those involved in hacking schemes are often able to hide their true identities behind a computer screen, sooner or later many of them end up in police custody. One of the most recent examples of this is Lauri Love, a U.K. citizen who will be extradited to the U.S. on charges of hacking. Love, […]

More than a third of the users do not bother with Wi-Fi protection

It has become almost second nature – Surfing on the Wi-Fi network. However, while connecting to a wireless network can hold hidden risks, more than a third of the users do not take any caution when connecting. It is easy to connect to the network. Alongside cellular networks and broadband Internet communications, usually there is […]

The cyber-attacks transformation

For quite some time, the cyber-attacks are not the intelligence agencies and countries sole possession. They are also used by corporations who want to know everything about their competitors. Today, the usage is almost constant in the private sector as part of execution of transactions and have become a significant burden for companies and various […]