5 ways to think like a hacker, starting today

NEWYou can now listen to Fox News articles!

The more we rely on our devices, the more vulnerable we are to attacks and scams. Your smartphone is a prime target. Tap or click here for three ways to secure it from hackers

It’s not just passwords and sensitive details you need to protect. Think about all the photos and videos stored on your phone that you would be heartbroken to lose. Tap or click for the best ways to save your phone’s photos before it’s too late

Stopping cybercriminals starts with your frame of mind. You need to think like the bad guys. Here are five smart ways to do it and tips to help you secure your digital life the right way. 

16 December 2021, Baden-Wuerttemberg, Rottweil: A hacker software is open on a laptop.

16 December 2021, Baden-Wuerttemberg, Rottweil: A hacker software is open on a laptop.
(Silas Stein/picture alliance)


1. ‘My job is easy when you use old devices.’ 

Security patches and system updates protect you from the latest hacks and bugs. Hackers know that, of course, which makes older devices juicy targets. 

Most of us retire old smartphones before it becomes dangerous to use them, but what about the rest of your smart devices? 

That first-generation Amazon Echo you have sitting around? It is no longer secure. Hackers can gain access to it and record your conversations. That’s just one example, of course.  

Tap or click for a list of Internet of Things smart devices you need to stop using now. 

Bottom line: Once your connected gadgets stop receiving updates, it’s time to say goodbye. This advice goes for security cameras, hard drives, smart plugs, routers, and even your browser. 

Go a step further: How to protect your security system from hackers. 

2. ‘I’m much better than hackers you see in movies.’ 

Anytime a hacker in a film wants to break into a system, the person will type a bunch of characters, and they’re in. It really can be that easy. I tell you all the time that reusing passwords is dangerous. Here’s why. Say you use the same password across a few sites, and then one site is breached. 

Your login credentials go up for sale on the Dark Web. Everyone who gets their hands on your credentials tries that same username and password…