Advertisement

1. We send incredibly personal emails

1. We send incredibly personal emails
Getty Images

Spear phishing, the act of sending targeted emails to get you to share financial information or passwords, can be exceptionally sophisticated.

“The old-style ones had spelling and punctuation errors, but today, it has really become an art,” says Mark Pollitt, former chief of the FBI’s computer forensic unit.

“They may call you by name, use your professional title, and mention a project you’re working on.”

Outsmart us: Spot phishing emails by looking for incorrect or unusual URLs (hover over links to see the actual URL address), requests for personal information or money, suspicious attachments, or a message body that’s actually an image.

Unless you’re 100 percent confident that a message is from someone you know, don’t open attachments or click links.

If you’ve been the victim of a data breach, take these 5 steps immediately!

2. We've got all the time in the world

2. We've got all the time in the world
Getty Images

Hackers have programs that systematically test millions of possible passwords.

“They go to sleep and wake up in the morning, and the program is still going, testing one password combination after another,” says Peter Fellini, a security engineer with Zensar Technologies, an IT and software services firm.

Outsmart us: Instead of a password, try a passphrase. Use letters and characters from a phrase and include special characters, numbers, and upper- and lowercase letters (Mary had a little lamb could become mh@Ll, for example).

Or consider a password manager that generates and remembers random, difficult-to-crack passwords.

Even then, some experts recommend unique passphrases for financial accounts in case the password manager gets hacked.

You may feel like your password is safe because it uses letters, numbers, and an ampersand, but don’t be so sure. Here’s 9 ways your computer password will get you hacked.

3. We sneak while you surf

3. We sneak while you surf
Getty Images

A growing number of cyberattacks are arriving via “drive-by download,” says Giovanni Vigna, a computer science professor at the University of California at Santa Barbara and cofounder of anti-malware provider Lastline Inc.

“You visit what looks like a perfectly harmless website,” he says, “but in the background, you are redirected to a series of other sites that send you an attack.”

Often even the website’s owner doesn’t know the site has been compromised.

Although search engines keep blacklists of known malicious sites, the bad sites are continuously changing.

Outsmart us: Make sure you install all available updates to your browser, or use a browser that automatically updates, like Firefox.

Vigna’s research has found that Internet Explorer users are most vulnerable to these attacks.

These former identity thieves confess the tricks they use to scam you right under your nose.

4. We can infiltrate your baby monitor or Smart TV

4. We can infiltrate your baby monitor or Smart TV
Getty Images

Remember, your smart device is essentially a computer – and chances are, it’s not a particularly secure one.

Anything in your house that’s connected to the Internet, from your smart fridge to your climate-control system, can be hacked.

In several recent incidents, hackers were able to hijack a baby monitor and yell at a baby.

Experts have also shown how hackers can turn on a smart TV’s camera and spy on you.

Outsmart us: When setting up smart devices, always change the default password.

Most of these devices work from your wireless router, so password protecting your Wi-Fi can also help.

Keep up with firmware updates; many devices will inform you when there’s an update available.

Otherwise, look for an ‘Update Firmware’ option in the main menu or settings.

We’ve all heard that our computer camera can be used to spy on us. Is it true? Is it even possible? We got the tech experts to give us the download.

5. We eavesdrop on free public wi-fi networks

5. We eavesdrop on free public wi-fi networks
Getty Images

Even if you’re connected to a legitimate public network, a “man-in-the-middle” attack can allow hackers to snoop on the session between your computer and the hotspot.

Outsmart us: Avoid public Wi-Fi if possible, especially unsecured networks without passwords, advise security experts at MetLife Defender, a personal data-protection program.

Instead, set up your smartphone as a secure hotspot or sign up for a VPN (virtual private network) service. If you must use public Wi-Fi, avoid financial transactions and consider using a browser extension like HTTPs Everywhere to encrypt your communications.

Managing your phone’s Wi-Fi access is just one trick to help stretch your mobile phone dollar further.

6. We lure you with 'amazing' videos on Facebook

6. We lure you with 'amazing' videos on Facebook
Getty Images

A friend just posted a video of an “unbelievable animal found in Africa.”

If you click to watch, you’re asked to download a media player or take a survey that will install malware on your computer, says Tyler Reguly, manager of security research at the cybersecurity firm Tripwire.

It also shares the video with all your friends.

Outsmart us: Type the video’s title into Google and see if it’s on YouTube. If it’s a scam, someone has probably already reported it.

Feel like the demands of Facebook are becoming a little too invasive? Take a look at the 15 Facebook hacks that put you back in control.

Advertisement

7. We take advantage of your typos

7. We take advantage of your typos
Getty Images

Fake sites with slightly altered URLs like micrososft.com look surprisingly similar to the real site you meant to visit, but they’re designed to steal your data or install malware on your computer.

Outsmart us: Double-check the site’s address before logging in with your name and password, especially if the home page looks different. Check that there’s https in the address before typing in your credit card information.

There’s no such thing as a harmless typo. Here are 9 of the most expensive typos in the world.

8. We crack your password on "easy" sites

8. We crack your password on "easy" sites
Getty Images

A 2014 study found that about half of us use the same password for multiple websites, making a cybercrook’s job easy.

“A hacker will break into a soft target like a hiking forum, get your email address and password, and then go to your email account and try to log in with the same password,” says Marc Maiffret, chief technology officer at BeyondTrust, a security and compliance management company.

“If that works, they’ll look to see if you have any emails from a bank. Then they’ll go to your bank account and try that same password.”

Outsmart us: Use two-factor authentication, a simple feature that requires more than just your username and password for you to log on. In addition to your password, for example, a site may require you to enter a randomly generated code sent to your smartphone to log in.

Many companies – including Facebook, Google, Microsoft, Apple, and most major banks – now offer some version of this safeguard.

(For a list of US-based companies, visit twofactorauth.org. Click Docs next to a name to find out how to set it up for that business.)

9. We love your Bluetooth headset

9. We love your Bluetooth headset
Getty Images

If you leave the Bluetooth function enabled after using a hands-free headset, hackers can easily connect to your phone, manipulate it, and steal your data.

Outsmart us: Always turn Bluetooth off after you use it. Set your visibility to “off” or “not discoverable,” and require a security code when you pair with another Bluetooth device.

10. We easily break into routers with WEP encryption

10. We easily break into routers with WEP encryption
Getty Images

Many older routers still rely on a type of encryption called WEP (Wired Equivalent Privacy), which can easily be cracked with a widely available software program that anyone can download.

Outsmart us: Make sure your router uses WPA2 (Wi?Fi Protected Access 2), the most secure type of encryption, or at least WPA.

Click your computer’s wireless network icon to check the security type.

If your router doesn’t give you one of those choices, call your router manufacturer to see if you need to do a firmware update – otherwise, plan to get a new router.

Don’t forget to change your preset Wi-Fi password, since any good hacker knows the default passwords for all major routers.

Never miss a deal again - sign up now!

Connect with us:

Philippines lockdown update:
Please be advised that due to the current lockdown in the Philippines, we hope to have the April print issue available by the middle of July, and the May, June and July issues available by the end of July, but this is dependent on when local lockdown restrictions are lifted. We sincerely apologise for this inconvenience. Thank you and stay safe!
– The Reader’s Digest team