Hackers Checklist! Secure Your Online Activities Today!




How do you protect your Internet security in this age where technology is progressive and devices being produced have Internet capability? We can’t stress enough how important data security is when the Internet is never always secure.

  • Data Targeted

What are hackers after for anyway? In 2011 to 2014, their primary target was cardholder’s information.

  • 96% of stolen data were of payment cards and are used for fraud
  • 2% of stolen data were of intellectual property and classified information
  • 1% of stolen data was of the ePHI (Electronic Protected Health Information) that can include your Social Security numbers and payment information
  • 1% was of financial numbers in business which includes operating cash flow, bank accounts, your net income, and total inventory

Why would these hackers want to get your personal information and sometimes even the minute details of your life story such as your pet’s name? Two words – Identity Theft.

Just last year, the number of identity theft victims was at 12.6 million. That means for every three seconds, there was one person victimized. In 2012, hackers managed to get a total of $24.7 billion and 15.4 billion in 2014 for their supposed craft.

2.Hacker Checklist


Below are what hackers set out to get from us on a daily basis:

    • Account log-ins (usernames, passwords, and PIN numbers)
    • Bank and credit card account numbers
    • College or university financial aid information
    • Contact details
    • Driver’s license and passport numbers
    • Employment and student ID numbers
    • Insurance ID numbers
    • Professional license numbers
    • Social Security numbers
    • Utility account numbers




3.Methods of Entry

Now how do these hackers find you? Hackers are ingenious and masters of stealth. They employ several ways to get into what you thought was a fairly secure network. Here are some handy technical terms both hackers and security system personnel use:

      • 47% Remote Access

Hackers are able to access data remotely, no matter the distance.

      • 25% SQL Injection

SQL injection is a web attack mechanism designed to steal data by improper coding

      • 17% Unknown

Unknown methods of entry either have weak credentials or a default, or both.

      • 3% Remote Code Execution

Hackers can manipulate your server and execute commands remotely.

      • 2% Client-Side Attack

Client-side attacks usually take the form of browses plug-ins and any other base

software-related products we sometimes carelessly install.

      • 2% Remote File Inclusion

Web servers are compromised when a remote file is included through a script by hackers.

      • 2% User Interaction

Data is accessed when a user interacts with a specific element that hackers supplied.

      • 1% Authorization Flaw

A flawed access control welcomes hackers to trigger attacks and steal data.

      • 1% Physical Theft

A bolder move, this is when people take your personal items such as your laptop to get  your lucrative data.

4.Social Networks

Where else can you find people prone to user interaction hacking than in social media sites? Social media is every hacker’s fishing pond.

      • 16% of students were controlled phishing scam victims
      • 72% of victims believed in a fraudulent link their “friend” sent
      • 68% of social media users publicly display their birth dates
      • 63% show where they attend high school
      • 18% have their phone number listed on their social media profiles
      • 12% mention their pet’s name

Do you still think these personal information aren’t enough to fuel hackers’ desires?




5.Home Wi-Fi

Hackers can easily access your home network remotely (within range) to steal data. Unfortunately, 19% of Internet users still continue to use WEP encryption. WPA-2 encryption is your best bet in securing your home’s Wi-Fi connection.




Click next button below and you get more Information On How To Secure Your Online Activities…

Next →
NordVPN Best VPN Service
Information technologist, IT security analyst, leader in hacker techniques and countermeasures, solid background in network security and risk management with experience at multiple multi-national firms, creative thinker with problem-solving skills, blogger, writer, privacy advocate,

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>