By Jerome Auza
The term ‘hackers’ used to mean something positive among computer programmers. If you are able to make a program that solves a complex computing problem, you will be called a hacker. It is a badge of honor. Until someone used the word hacker to describe someone that does malicious programs. Nowadays, people who make computer viruses and malware, or people who make attempts to defraud or steal sensitive personal information.
Today’s work, entertainment and personal communications involve computers and mobile devices on a very large scale and it becomes very important to keep your personal information secure. In the 1990’s, computer viruses created by “hackers” were mostly created to destroy computer data and annoy users. Back then, computer networks is not common. In the present, most computers and mobile devices are connected to the Internet and the nature of “hacking” changed from data destruction and annoyance to fraud and theft of personal information.
Software that does the work of the “hacker” is commonly termed malware. A lot of malware can be running on your computer without your knowledge because all it does is collect personal information and send that to its creator in a sneaky manner which is mostly undetected. The longer it stays there, the bigger chance it will be able to get your personal information that becomes useful to the “hacker”.
Once your personal information is stolen, the “hacker” can then pretend to be you and maybe send emails to your contacts asking for money because “you” are in a foreign country and have lost all your things because you were mugged. Your helpful friends may be tricked in sending money to “you” via the popular money transfer services straight to the “hacker”. Of course, you are not in a foreign country and imagine the surprise on your friends’s faces when you meet them after they sent the money.
Users of popular social network websites should be particularly be careful. These websites make it very convenient for you to login again after you leave, most of the time remembering your login information. If you forget to logout of the website on the computer you are using, the next user can then use your account on the website.
Some tips to avoid being a victim:
- Keep your passwords secret and difficult to guess (but easy for you to remember), especially those you use for sensitive information like that in online banking, social networks and email. By using upper and lower case letters, numbers and symbols, your password will become much harder to guess.
- Avoid using computers in Internet cafes, kiosks and other public areas. It is really hard to tell if the computers are not compromised by malware.
- Avoid using WiFi connections that you are not sure who owns it. One of the easiest ways to capture personal information is to setup a “free” WiFi network and then “sniff” all the data coming through that WiFi network. Sometimes you think you are sneaky and got “free” access to the Internet but your personal data is already compromised in just a few minutes.
- Avoid installing pirated software. The people creating these pirated copies can actually make the pirated software capture your personal information. You hate paying for licenses for software but why use illegal copies when there are equivalent free software. For example, there is an equivalent to MS Office called Libre Office (formerly Open Office). So there is really no point in using a pirated copy of MS Office.
- Use anti-virus software if using the Windows operating system. There is a free version of the AVG anti-virus software intended for home users (see www.avg.com). Use that instead of pirated anti-virus software.
- Ignore emails that seem to come from banks, courier services and other popular websites and are asking for your login name ad password. The real websites will never ask you to send login and password information via email.
- Be discerning when you receive an urgent request for money from your friends. It is possible that your friend’s email account was “hacked” and is already under control by the “hacker”. You need to confirm such request before sending any help.
- Avoid going to websites that offer “free” pictures or videos of scandals with popular personalities in it. A lot of malware is delivered via links to supposedly show such videos.
Just be alert and use your common sense when dealing with online information. A lot of fraud is being attempted on the Internet because it is the fastest medium to use in trying to collect personal information.