Hacked: Cyber-safety in the digital era

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.


File photo: A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS

The most common hacking techniques and how to protect yourself from them

Cybercrime costs over $10 million every minute. It is projected to set the world back some $10.5 trillion annually by 2025. Data has become the gold of the digital economy revolution considering there will be 200 zettabytes of it by 2025.

And so, cyber-security has emerged as a critical issue affecting anyone with a digital presence. Massive data leaks, identity theft and extortion are just a few of the many problems plaguing the digital space.

Victims range from the often innocent and vulnerable to banks, multinational corporations, and powerful elites. Bangladesh is no stranger to cybercrime either.

That is why it is important to understand one’s digital presence now more than ever. The first step is familiarizing oneself with the hacking methods of cyber-criminals. Here are some of the most common hacking techniques to be careful of, what can be done to protect against such threats, and the measures Bangladesh is taking to securely ensure the digital dream.

Most common hacking techniques to be careful of and how to stay protected

Before getting into the most common hacking techniques, it is important to keep in mind that not all hackers are bad. While there are many malicious minds creating havoc, there are just as many digital guardians working tirelessly to help humanity for the best. The easiest way to tell between the good and bad is to differentiate between white hat and black hat hackers.

White hat hackers are the good guys; they are ethical computer security experts specialized in finding faults in systems that may expose your valuable data. Penetration testing is one of several ways white hat hackers can test and ensure the safety of a company or individual’s information system. They can be found employed among the ranks of Google, Microsoft, and Apple with the mission of keeping the digital space safe for everyone.

Black hat hackers are the bad guys; they are the ones stealing money and identities, leaking sensitive personal data, and facilitating illegal…

Source…