Tuesday, 5 June 2018

How to protect your device from Hackers.


Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure.

2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompts you to install software, don’t agree. And if your web browser or a search engine warns you a site may be malicious, hit the back button.

3. USB or Thunderbolt connector: Attackers can copy over a malicious program or otherwise take over your machine by plugging in a USB or Thunderbolt connector. The same goes for CDs and DVDs. Sometimes they will contain a program (autorun.exe) that runs automatically so your computer will be infected immediately if you insert the disc. So be careful what you put in or attach to your computer, and if you want it to stay secure, don't give strangers access to your device.

Remember, modern computers are designed to fend off these malware attacks. As long as we keep building them as such, you’ll have a chance to fight back against being 0wned. Find tips for detecting attacks on your computer in our guide on malware.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Related Posts:

  • Enhace These Skills and Get a Chance to Work @ Google. Must Read.!! We all know that getting placed in Google is one of the most desirable employers in the world. Engineers at Google are the masters, and their salary is high enough. For Google employees salaries for Interns start from … Read More
  • World's First Fully Automated Tooth-Brush . Say hello to Amabrush, the world’s first automatic toothbrush, and goodbye to brushing your teeth for minutes at a time twice a day. Amabrush resembles a mouthguard with soft silicone bristles in it, and it is magnet… Read More
  • Difference between Viruses and Malware Difference Between Viruses and Malware These days many of us talk about like malware and spyware a lot more than the virus. Have you ever wondered what exactly are all these? Beginning with to understand what a virus i… Read More
  • How does Aeroplane WiFi Works...?? Internet has become an integral part of everyone’s life, as connectivity has become important these days. As a result, the in-flight announcement to switch off our electronic devices or put it on airplane mode while on… Read More
  • 18 Useful CMD tricks You Must Know. When you have such an attractive interface, using Command Prompt might seem like a old fashioned thing. When you can easily navigate to a location or access different settings in your PC customize them, why go for c… Read More

1 comments:

  1. https://www.facebook.com/profile.php?id=100028947353917

    ReplyDelete