Avoid Being Hacked

Hacking is a major issue, and hackers use many tricks in an attempt to access your data. There are steps you can take to protect yourself and your data from the most common hacking methods.

Anti-virus software (Norton, McAfee, Sophos, etc.)
SPAM
  • Most spam will not cause harm, however the best practice is to delete emails from unknown sources and those with attachments. If you reply or attempt to unsubscribe, this will confirm to the spammer that your account is active and in use.
Anti-spyware
  • "Malware" or "spyware" are terms used to describe malicious software that can be used to cause denial of service attacks or harvest sensitive data (credit card numbers, etc.) from your computer. These programs can cause you to receive pop-up ads and/or track your web surfing habits. Attachments can be harmful to your computer and can carry malicious viruses and malware. There are tools available, such as Spybot Search and Destroy or Ad-Aware, that scan your computer and identify malware and other harmful items. Once found, these programs give you the option to delete the items. These programs also need to be updated so that you have the most current versions.
Patches, security updates, etc.
  • Virus writers and hackers will exploit holes in programs to gain access to your computer. To keep your computer up to date with the latest security fixes and patches, visit http://update.microsoft.com/microsoftupdate on a routine basis. If are you running an Apple or Linux machine, be sure to check routinely for updates also.
 
 
Social Networking (Facebook, MySpace, etc.)
Social networking through the use of such services as Facebook have become part of everyday life for many of us. These types of networks can be used to find others with common interests, share personal information, and communicate with friends. While cyber communities can be used in positive ways, it is important to use common sense and keep several key thoughts in mind:
  • The information you place online can influence your future. Pictures that may demonstrate behaviors that are questionable or suggestive can be viewed by anyone on the Internet, including possible future employers. There have been instances where graduates have had their Facebook page called up during the interview process.
  • Making your information private does not mean that others are unable to view the material. Hackers have many tricks that enable them to view what is thought by you to be off limits. You should also remember that pictures or other information posted for a short period of time and then removed by you may have been downloaded by others and exist in cyberspace for years to come.
  • Be safe. Use common sense when entering information on Web sites. There is the illusion that your information is there for only your friends to view but realize that your information can be passed on to others that may not have your well being in mind. It is strongly suggested that you do not post information such as phone numbers or your place of residence.
  • Think about how you represent yourself and others. It is not only important to take note of what you say about yourself online but equally important are the comments you make about others. You do not want to face alleged violations that claim inappropriate behavior on your part.

 
 
Picture

In what has become one of the biggest data breaches in history, Sony has been notifying its users of a computer intrusion and data breach that has exposed personal information on 77 million PlayStation Network users.


Among the data the hackers have been able to get are Names, passwords, country of origin, zip codes and phone and credit card numbers.

With that much information, one's identity can be easily spoofed and impersonated, fraudulent charges made and more.

If you are one of those affected, please log in to your PSN account and change your password immediately, specially if you are the type that uses the same password everywhere.