26.08.2016 Views

february-tw-2016

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

combinations until a correct password is discovered. Be sure to make strong passwords and<br />

change them on a regular basis<br />

Any system connected to a ne<strong>tw</strong>ork can be hacked. T he best solution to prevent hacking is<br />

keep hackers from entering your ne<strong>tw</strong>ork or keep them from isolating you system by<br />

disconnecting it from the ne<strong>tw</strong>ork.<br />

HACKED E-MAIL<br />

T here are many different ways an e-mail account can be compromised. People invent ways to<br />

hack e-mail constantly. Here are 3 methods of how your e-mail account can be hacked.<br />

M ethod #1<br />

Imagine you?re at the food court in the mall. You open your laptop and connect to the mall?s<br />

free WiFi.<br />

Now it?s time to check your e-mail messages because you are expecting important news. You<br />

open the e-mail client on your computer and start browsing the Internet. After a while, you go<br />

on your way to work, home, or school. But did you notice the guy at the next table with his<br />

laptop? He just took your email credentials while you weren?t looking.<br />

He used the Man-in-the-Middle hack. He set up his computer to act like a router and tricked<br />

your computer into thinking that his computer was the actual router. T he mall's router thinks<br />

the guy's computer - in the middle of the connection ? is your computer.<br />

Once a hacker gains access to your ne<strong>tw</strong>ork connection they can view all kinds of data packets<br />

coming from your computer to the mail server (or to any server). Each time you make a<br />

connection to the mail server you are sending your authentication credentials through the bad<br />

guy?s computer.<br />

From there it?s easy to use a program to filter out all packets containing your log-in<br />

credentials. T his includes your Facebook, T witter, and bank account log-in information as<br />

well. Everything!<br />

You can prevent this by not using the free WiFi. Use the Internet connection on your smart<br />

phone. Most smart phones can turn your password protected connection into a hot-spot for<br />

use with your laptop.<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!