CAUTION HACKERS

in #blog6 years ago


Some time ago, no one even could not imagine that computers could be captured by so-called "pirates". These attackers use the world wide web to create their own botnet network to gain access to and control the computers of their victims. Through a botnet, you can run malicious commands and messages that can destroy the main sites of the country in a matter of minutes. Telephone lines and ATMs stop their work, flights can be canceled and, terribly, computer security systems at nuclear power plants and other strategic facilities can get out of control.

It is impossible to say unequivocally for what purpose cyber attacks are carried out. For example, states can use them to master the secret information of their opponents, or to disable the strategic objects of a country. US Deputy Secretary of Defense, William Lynn, stated that classified documents relating to strategic plans, intelligence information, and weapon blueprints were repeatedly stolen from secret US computer networks.



And if we talk about everyday life, then hackers use these methods in order to seize intellectual property or financial information. According to unofficial data, illegal operations generate billions of dollars in revenue.

We have already noted that for cyber attacks, hackers create entire networks using the computers of their victims. For example, in 2009, a cyberband was exposed that used more than two million computers of its victims to manage an international network. According to the Organization for Economic Cooperation and Development, every third computer that operates remotely on the Internet is controlled by intruders.

Hackers also use a huge number of malicious programs, which, having found a weak spot in your computer, infiltrate it and seek out the necessary information. These programs are able to change or delete files, be transmitted by e-mail, send passwords or other confidential information to attackers.



Internet users should be extremely careful, because there is an opportunity to independently infect your computer, for example, when opening an e-mail attachment or downloading and installing a free program, as well as visiting questionable sites.

Determining whether your computer is infected with any virus is quite difficult, but if you see that the computer has slowed down significantly, applications are not opening, or installing suspicious programs through pop-up windows, we recommend that you contact a specialist.

It's no secret that more and more people and countries base their work on computer systems, so the conclusion is that we should expect an increase in the number and quality of cyber attacks. That is why many countries are developing advanced software that can strengthen the country's information security. Also, many countries are conducting large-scale tests of the reliability of computer networks. But, according to Stephen Chabinski, the deputy director of the FBI’s cybercrime department, if the desire, money and time are available, the enemy can always penetrate the system under attack.



Below are a few rules that will help secure your work on the Internet:


1. Be sure to install on your computer antivirus, firewall, as well as applications that can block the operation of spyware. Regularly update these programs and the operating system itself.

2. Before opening links or email attachments, make sure they are for you. Be especially careful with letters from strangers, as well as with letters that require the disclosure of personal data and confidential information.

3. Do not download or run programs from unknown sources.

4. Use passwords that consist of at least eight characters and are a combination of letters and numbers. Periodically it is recommended to change passwords, as well as use different passwords for different accounts.

5. Work only with those firms that use encrypted connections.

6. Do not distribute confidential information and personal data when working with unprotected Wi-Fi networks.

7. Do not forget to turn off your computer when you are not working on it.

8. Make copies of files and store them in another safe place.

Sort:  

You got a 22.22% upvote from @votejar courtesy of @artblog!

You have been defended with a 11.36% upvote!
I was summoned by @artblog.

You just received a 13.25% upvote from @honestbot, courtesy of @artblog!
WaveSmall.gif

You got a 7.41% upvote from @dailyupvotes courtesy of @artblog!

@dailyupvotes is the only bot with guaranteed ROI of at least 1%

You got a 5.89% upvote from @joeparys! Thank you for your support of our services. To continue your support, please follow and delegate Steem power to @joeparys for daily steem and steem dollar payouts!

Coin Marketplace

STEEM 0.22
TRX 0.20
JST 0.035
BTC 96819.43
ETH 3313.98
USDT 1.00
SBD 3.13