Three kinds of unusual way of hacking leak & how to protect yourself?

Data breaches and hacker attacks has now become a common part of our daily life, unless you are a network security professional or your personal data at risk, or you do not actually care if a new vulnerability.

As the US Federal Trade Commission has pointed out, the Marriott hotel chain's more than 500 million users of the data has been destroyed in 2018, a hacker attack to the company goals. And not the first time: Marriott 383 million due to leakage of customer information was fined $ 124 million the United Kingdom.

However, the company is not the only international hotel chains malicious hacker attacks. The problem extends even to the average user. Since the beginning of this year, we saw more daring exploits, they are trying in some way to capture stunning user data.

1. install malicious software for mobile phones

In January 2019, we found that all meteorological applications Alcatel smart phones contain malicious software that came with its source code.

Sources said, the application can also be used in the Google Play Store and has been downloaded and installed over ten million times. The application is responsible for collecting user data located and distributed to our database.

However, the violation is not limited to this, because the application also steal the user's telephone number, the telephone service to the lives of these people had a tremendous impact.

2. Smart phone unlock problem

These are the planet's most advanced smartphone users must endure a series of loopholes. HackRead pointed out earlier this year, users find they can use a transparent shell phone or some cellophane and any person's fingerprint to bypass Samsung S10 fingerprint function.

S10 also mentioned facial recognition software can be easily spoofed by video using the owner's unlocked. Samsung is not the only culprit here, because Nokia PureView fingerprint sensor 9 defeated a pack of gum.

These mobile phone users will be vulnerable to hacker attacks, virtually anyone with specialized knowledge can be implemented.

3. television companies enjoy the privacy of users

Although not collect any data on the smart TV from us and what framework it is possible to send data, but the British "Financial Times" reported that these devices are sending personal user data they collect to Facebook and Google and other large technology companies.

Such small companies like Netflix also is receiving this data, even if the user does not have the problem of account on the site. Share personal data has become a symbol of security vulnerabilities.

Smart TV is just one of the devices in cooperation with the parent company. These hackers demonstrate the vulnerability of the modern world vulnerable devices. If proper incentives, even a highly secure system may also become prey dedicated hackers.

Last year, the incidence of data leakage and leakage has increased. Users to ensure that their applications will not be a victim of malicious and the only way to keep abreast of the initiator of the event is happening around.

How to protect themselves from such attacks?

You will receive an e-mail threat is realized by e-mail. They take many forms, usually very easy to identify - if you know where to look at. Check the sender's email address.

Typically, the name of the show will be the name of the organization trusted, but it is clear that it sends e-mail address is not them.

1. Never reply

These phishing e-mail, and to reply to the sender to confirm that they have your valid email address. If the content of the email was sent from a real organization, there will be no spelling mistakes, or ask for personal information.

2. Do not point the mail link

Contact the sender by so-called detailed information on the real site. For example, the real bank will never ask you to enter personal details, even if the e-mail that they have identified a need to clarify your security vulnerabilities, the bank will call you or contact you by mail.

3. The password must be complex

Do not select other information from your date of birth, or a child's name can be found in the public domain. Each application and website should you need to log in using a different password.

Remember all the different passwords can be cumbersome, and we recommend that you do not forget them, so you can use strong encryption software to store passwords.

4. Software Security Update

They are identified in the release of the new threats and viruses, if you do not update your desktop or other device, then your software from the latest version of security protection.

Although you may think that this update is only used to repair the appearance of errors, but the reality is that the update includes some basic security patches that have been encoded to protect the user (ie the user).

Website and application information you provide sufficient hackers using your interests. Consider the content and information provided by you registered.

Careful use of a single e-mail address, you can use it for important communications: newsletters, contests and so on. According to updated equipment requirements, and choose complex passwords to scammers make life difficult as possible.

Guess you like

Origin www.cnblogs.com/GX1234/p/11896715.html