Articles by "Hacking"
Showing posts with label Hacking. Show all posts
Cpdemy is a knowledge driven hive dedicated to producing great how-to, tips and tricks, awesome tutorials on Photoshop, Wordpress, Blogger, SEO


The internet as we know very well is full of threats and each day new threats, such as malware (computer viruses, ransomware, spyware, adware, rootkits, trojan horse, worms, etc..) arise.

Also hackers (phishing, identity theft, etc.) are a real threat online and all these threats can cause serious damage to your computer and even your personal life.

Fortunately, there are some things you can do to better protect your computer, home network, internet connection, and online activities against viruses (and other malware) and hackers.

Computer & Internet Security Tips

The best computer and internet protection is yourself and you will have to watch out with everything you do, online and offline. These tips will help you to better protect yourself from viruses (and other malware) and hackers.


1. Use a genuine version of Microsoft Windows. 
Using pirated/cracked versions of Windows can bring you many disadvantages, such as:

· No official and commercial support from Microsoft.

· Windows could be modified by a hacker to spy on you.

· No official versions and updates. Updates are very important!

· Windows could work slow because of the hacks done to make it genuine.

· Malware (computer viruses, spyware, trojan horse, worms, rootkits, etc...) pose a unstoppable threat.

Tip: if you don't want to buy a genuine version of Microsoft Windows, then I recommend using a alternative free operating system, such as Linux Mint or Ubuntu (both are quickly installed and easy to use).


2. Use a Firewall
A firewall is software or hardware that helps screen out hackers and malware that try to reach your computer over the Internet. Windows comes with a (software) firewall built-in, but you must be sure that it's turned on.


3. Use Antivirus Software – no matter how careful you are. 
No matter how smart you think you are, you can still benefit from antivirus software on your Windows PC. You can see antivirus software as your final layer of protection. Even one of your favorite websites can one day be infected with malware and antivirus software can protect you against it.

Two examples of good free antivirus programs are Bitdefender Free and Kaspersky Free, but if you're looking for more features, then the paid versions of Bitdefender and Kaspersky are good options. Bitdefender and Kaspersky always have very high scores in antivirus tests (AV-tests). They're always in the top for many years now.

4. Keep Windows and software always up-to-date
Updates may include important patches to fix security vulnerabilities and this prevents attackers from exploiting security holes.


5. Always take security warnings from Windows, antivirus software and your web browser seriously. 
If you ignore security warnings from Windows, antivirus software and your web browser, then your system may likely get infected with malware.


6. Don't use a Windows administrator account for daily use, but use a standard account instead. 
If malware or a hacker gets access to your system, then the malware or hacker has the same rights of whatever account you're using. So if you use an administrator account and malware or a hacker takes control of your system, then the malware or hacker can do anything he, she or it wants and have full control of your system, but if you use a standard account then they can only do things that don't require administrator permission, so he or she can't change important system settings or install malware, and malware can't install itself unless you enter the administrator password.


7. Don't download, install and use pirated/cracked software. 
This is a very important part, pirated/cracked software could infect your PC with malware. The crack (piece of software used to crack the software to make it look genuine) might actually be disguised malware.


8. Always download software from a trusted source, like the official website of the maker of the software. 
Nowadays when you want to download software you have to be very careful before you click on any "Download" button or link, because you never know what you may end up with! You might be downloading and installing crapware or adware.


9. Pay attention when installing software. 
Never click to fast on "Next", "Install", "OK", etc. when installing software, because you might install extra unwanted third-party software (like toolbars). If you see extra offers, then uncheck all their checkboxes.


10. Never click on "OK", "Yes" or "Run" when a pop-up window appears to ask you to download and install unknown software. 
Malware will sometimes try to trick you in installing even more malware. Example: a pop-up window appears with a warning message, like "Your Windows computer could be at risk! Install the repair tool to clean and protect your system...." and when you click on "Secure now", "OK", "Yes" or "Run" then your system gets infected.


11. Check free software before downloading and installing it onto your computer. 
Software could just be Malware disguised as software, so always Google the software first and look for reviews or forums that talk about this software.


12. Don't download and open email attachments from a suspicious email – unless you can verify the source. 
Many computer viruses are delivered through an email attachment. Attachments that contain viruses are either executable programs (file types: .com, .exe, .vbs, .zip, .scr, .dll, .pif, .js) or macro viruses (file types: .doc, .dot, .xls, .xlt). And if you don't trust a file or link, then you can also check it using VirusTotal.com.


13. Disable or better yet, uninstall Java if you don't need it. 
Java has a lot of security vulnerabilities which are constantly being exploited in cyber attacks. Java vulnerabilities are one of the biggest security holes on your computer. It needs constant patching (security updates). 
Recently, Java has made a lot of updates which has really reduced its vulnerability.


14. Disable or uninstall Adobe Flash Player if you don't need it (disable also in your web browser)
Like Java, Adobe Flash Player has also a lot of security flaws which are being exploited in cyber attacks. You should also disable it in your web browser, because browser plugins are a favorite target for malware and cyber criminals because they are generally full of unpatched or undocumented security holes that cyber criminals can use to take complete control over vulnerable systems.

15. When you insert a USB flash drive or external hard drive from someone else into your PC, then scan it first with your antivirus program before opening or copying anything. 
It's always good practice to scan someone's USB flash drive or external hard drive for malware when you use it on your PC, because USB plug-and-play devices are the easiest method to infect computers.


16. Never click on unknown links or links that look suspicious. 
Links can bring you to malicious websites that will infect your PC or they can bring you to a fake login page and when you type your login information into this fake login page then hackers will have this information also. So when you get an email with a link in it, then don't just click on it. Same counts for links on unknown websites. If you are curious about a link, then you could check the link (URL) at VirusTotal.com.


17. Never download "codecs" or "players" to watch videos online. 
If a website wants to install video codecs or a media player, then don't allow it. It's not worth the risk. Most likely you can find the video on YouTube or another video website anyway.


18. Disable macros and ActiveX in the Microsoft Office suite – Word, Excel, PowerPoint, etc... 
These are bits of software that cyber criminals often use to spread malware and infect computers.


19. Enable the "show file extensions" option in Windows and always verify file extensions before clicking on them. 
Cyber criminals are very good at camouflaging files to make them look harmless. The purpose is to trick you into clicking on them and launch a malware infection that will take over your system. Change your Windows settings to show file name extensions, so you will avoid clicking on shady file extensions, like .jpg.exe (.jpg isn't dangerous, because it's an image format, but combined with .exe it's malware).


20. Disable AutoPlay on your PC. 
AutoPlay is a Windows feature that allows you to quickly open digital media from USB flash drives, External hard drives, CDs and DVDs with designated software. Malware can use this feature to start running automatically and gain access to your computer.


21. Don't keep Wi-Fi and Bluetooth on – unless you're actively using it. 
Cyber criminals can use both of these connections to attack and compromise your devices.


22. Secure your home network. 
· Keep your router's firmware up-to-date.

· Change your router's default IP address.

· Change your router's default administrator password and username.

· Encrypt your Wi-Fi network with WPA2 or WPA encryption (WPA2 is the strongest). Don't use WEP encryption.

· Disable UPnP (Universal Plug and Play).


23. Be careful when using a public, shared and free Wi-Fi network. 
· Use a VPN (Virtual Private Network).

· Don't do things that require your bank account information, credit card information or other personal, important and sensitive information, like online banking or online shopping.

· Don't share files with personal, important and sensitive information, because they might get intercepted by someone.

· Disable network discovery, file and printer sharing and public folder sharingin Windows.

· Visit only websites that use HTTPS encryption, so that you will have a more private and secure connection to that website. Example: https://www.facebook.com.


24. Don't use too many web browser extensions (add-ons / plugins). 
Web browser extensions are just part of the problem. Any form of browser integration can create security holes.


25. Disable Windows PowerShell if you don't use it. 
Windows PowerShell is a tool that's much more powerful than the Command Prompt. There are many types of malware (like ransomware), who abuse PowerShell to plant and execute malware deep in the victim's system.


26. Create regular backups of all your important files. 
Ransomware is a type of malware (malicious software) designed to block access to a computer system until a sum of money is paid. If this happens you will also lose access to all of your files (documents, etc...). Paying the ransom will not guarantee that you will get access to your system and/or files again. Ransomware is one of the world's fastest growing types of malware. So having a backup of your files is very important.


27. When providing answers to security questions for your online accounts, add a short word (that only you know) to the end of your answer. 
Social media can usually provide answers to common security questions. Adding a short word to the end of your answer can help prevent hackers (who have your personal information) from knowing the answer. Example word "meek", so if your mother's maiden name is Johnson, then enter something like Johnsonmeek (e.g. Mother's maiden name: Johnsonmeek).


28. Disable SMB1 on Windows. 
Microsoft recommends that you disable SMB1 for security reasons – especially for WannaCrypt, Petya (also known as Petwrap) and other ransomware, because they also use this to attack the Windows operating system.

29. Be wary of emails asking for confidential information – especially financial information. 
A legitimate organisation, like a bank will never ask for sensitive information like your password, bank account, or credit card by email. When you have any doubts, visit the main website of the organisation in question, get their phone number and give them a call or visit their office.


30. Never leave your computer, tablet or phone unattended in public. 
If your device gets stolen, then someone has not only your device, but maybe also your personal information (e.g. usernames, passwords, etc...). All it takes is someone with more than basic computer knowledge to get to your personal data.


31. Use strong passwords for your online accounts. 
Passwords protect your online accounts, so it's important to use strong passwords. A strong password is a combination of numbers, uppercase letters, lowercase letters and other characters.

If you are having trouble with creating and remembering multiple strong passwords, then use a password manager, like LastPass, KeePass, 1Password or RoboForm.


32. Never use the same password for multiple accounts. 
If you use the same password for multiple online accounts and someone obtains your password in one way or another, then he or she will have access to all of your online accounts that use the same password.

Your password can get compromised by a phishing attack or in a data breach. Data breaches happen more often than you might think – even with big sites, such as Linkedin, Twitter, Yahoo, MySpace and Tumblr. If you want to check if you have an account that has been compromised in a data breach, then visit https://haveibeenpwned.com, type your email address or username and click on the "pwned?" button. If your account is "pwned!", then you will have to act fast and change your passwords on all accounts that use the same password as the account that has been "pwned!".

If you are having trouble with creating and remembering multiple strong passwords, then use a password manager, like LastPass, KeePass, 1Password or RoboForm.


33. Use two-factor authentication for your online accounts (email, social media, etc...). 
Two-factor authentication (also known as 2-Step verification) is an extra layer of security for your online accounts designed to ensure that you're the only person who can access your accounts – even if someone else knows your passwords.


34. Cover up your laptop's webcam. 
Hackers can access webcams through malware. If your computer gets infected with malware, then that malware could contain executable code that can turn on your webcam and watch and/or record you.

If you want to be absolutely sure nobody is watching and recording you, then cover your webcam with tape, a peel-off sticker, or something else that can obscure the lens but can be removed easily when you actually want to use your webcam.


35. Don't post a photo of your airline boarding pass on social media (and don't just throw it away either). 
The barcode of a boarding pass contains information about you, such as your name, future travel plans and frequent flyer account.

Someone can take a screenshot of your boarding pass, go to a website that can read and decode the data stored in the barcode of your boarding pass and view your information.

With this information a hacker can get access to your frequent flyer account and reset the PIN number that you use to secure your frequent flyer account, change seats and even cancel any future flights.

When the flight is over and you're home or at your accommodation, then burn the boarding pass or toss it in a paper shredder.


Conclusion:
As already stated above, the security tip you would likely implement right now. I hope this helps you. 
Leave a comment if you have any other relevant tip and it would be added to this post.

Reference(s): 















Cpdemy is a knowledge driven hive dedicated to producing great how-to, tips and tricks, awesome tutorials on Photoshop, Wordpress, Blogger, SEO

We often talk to site owners who are surprised that their sites are targeted by attackers. Most of them assume that if there isn’t any juicy data to steal, like credit card numbers, that compromising their site is a worthless exercise. Unfortunately they are wrong. Aside from data, a compromised site’s visitors can be monetized in various malicious ways. The web server can be used to run malicious software and host content and the reputation of the domain name and IP address can be leveraged.


Last month we ran a survey that included the following open ended question for people who reported that their site had been compromised:

What did the hackers do to your site?

We received a total of 873 responses that could be categorized, which we did by hand. The chart below reflects the results. Many of the responses described multiple categories, so the percentages on the chart below deliberately add up to greater than 100%.

We did not include categories for “installed backdoor” or “installed malware”. We consider that to be more of a means to an end. Instead we focused on answering the question, “what’s in it for the attacker?”.



As you can see from the chart there are a wide variety of things that attackers are doing with compromised WordPress sites. Let’s take a look at each of them, so we can better understand the motive behind the attacks that we are constantly defending against.

Defaced Site / Took Offline

In some cases hackers replace your content with their own. The most common was political content from terrorist groups and the like. The next most common was hackers simply bragging that they hacked your site. In all of these cases the attacker is doing absolutely nothing to obscure what they have done, anyone who visits the site immediately knows that you’ve been hacked.

In other cases the attackers just destroy your site in some way, taking it offline. Based on what we see when performing forensic research on hacked sites, in the majority of these cases the attacker just screwed up what they were doing and accidentally took your site down.

Example of defaced website courtesy of opennet.net


What’s in it for the attacker?

For the attackers who replace your site with political propaganda, your site is just free advertising for their cause. Those that brag about taking your site down are looking for recognition.


Send Spam

Spam email continues to be a huge issue. According to Statistica, 54.4% of all email traffic on the internet was spam in December of 2015. According to our survey respondents, 19.8% of compromised WordPress sites are used to send email spam.

In many cases the site owner was not aware that it was happening for quite some time. In some cases they notice a slow down in site performance or a spike in server utilization that tips them off. Or their host recognizes it and alerts them.

Unfortunately a very high percentage don’t find out until their domain has been blacklisted by spam watchdog services like Spamhaus. If you depend on email for communication with your customers or others it can have devastating consequences.

What’s in it for the attacker?

The attacker gets two huge benefits. First they get to use the server resources that you’re paying for free of charge. Second, until they ruin your reputation, their email delivery benefits tremendously from originating from your domain and IP address. Ultimately they are trying to get people to click through to their malicious websites.


SEO Spam

There are a number of ways attackers can leverage your website to improve their search engine rankings. The first is to simply host pages on your domain, accruing the benefits of your Domain Authority and clean reputation. Example page below.

The next is to plant links throughout your site to the site(s) they want to give an SEO boost. Since backlinks are still the most important SEO ranking factor, an attacker who compromises a large number of sites can game search engine rankings in a big way.

Many of our respondents used the term “pharma hack” to describe this type of attack, because it has recently been used a lot to boost the rankings of pharmaceutical sales sites.

What’s in it for the attacker?

As I’m sure most of you know, ranking well for popular search terms is a great way to drive traffic to websites. By gaming the system with SEO spam, attackers are able to divert traffic away from legitimate sites toward their own.


Malicious Redirect

Redirects are an incredibly effective way for attackers to funnel traffic to malicious websites. The unsuspecting user doesn’t have to click on a hyperlink or advertisement for it to work, they are taken there directly.

Sometimes the attacker will take a very aggressive approach, redirecting all traffic to a malicious site or sites. But in many cases the attackers will employ measures to avoid detection, such as only redirecting some URL requests, and in some cases only activating the redirect for specific browsers or device types.
What’s in it for the attacker?

The motive here is simply to drive traffic to their malicious content.
Host Phishing Page

Phishing pages attempt to fool the visitor into providing sensitive information. In some cases they impersonate a bank or retailer and try to get you to give them valuable information like credit card numbers directly. In others they try to capture your username and password to various sites, including your WordPress site if you’re not careful.

What’s in it for the attacker?

The value of your credit card number is obvious. They can use other data to break into important online accounts, use it for social engineering or spear phishing attacks or to steal your identity.


Distribute Malware

Once they have compromised your site, attackers can install malware that in turn installs malware on your website visitor’s computers without their knowledge. This is an incredibly scary proposition for you as a site owner.

If Google detects that it is happening they will flag your site via their safe browsing program. This will cause your SEO traffic to drop significantly. For more details please read our recent blog post on the impact of a hacked website on SEO. Worse than that, site visitors that are infected will not be happy with you.

The impact to your reputation could be significant and long lasting. Luckily only 2.9% of respondents reported this.

What’s in it for the attacker?

Installing malware on hundreds or thousands of your site visitor’s computers gives the attacker direct access to steal information or wreak havoc on them.


Steal User Data

Given that most people we talk to assume that attackers are interested in stealing their data, we were surprised to learn that only 1.1% of our respondents reported it happening.

We think the main reason is that the majority of WordPress sites do not store sensitive data beyond user credentials for that site and maybe email addresses. It would also be very difficult for the owner of a hacked site to detect data theft if it occurred, so the numbers are likely understated.

What’s in it for the attacker?

Stolen user credentials could be used to regain entry to the site, even if the site has been cleaned. The username / password combinations can also be attempted on other sites in hopes that the user is repeating use of passwords.

Stolen email addresses can be used for spamming. Obviously more sensitive information like credit card numbers would be even more valuable.


Attack Site

In some cases an attacker will decide to use your web server as a platform to launch attacks on other websites. This is relatively rare based on our respondents, who only reported this happening 0.7% of the time.
What’s in it for the attacker?

The attacker gets to use your server free of charge for their malicious activities. They also are much more likely to slip past their targets’ defenses with the attack originating from your domain and IP address. At least until they ruin your reputation.


Ransomware

Ransomware is malicious software that blocks access to your website and demands that you pay a ransom in return for having access restored. This kind of attack has been receiving a lot of attention on blogs and in the press recently. So we were surprised to have only 0.6% of respondents report it.

A screenshot of the screen that TeslaCrypt displays when your files are encrypted. Courtesy Bromium Labs.

What’s in it for the attacker?

If you don’t have backups that you were able to keep out of the hands of the attacker, you may decide that paying the ransom is worth it.


Host Malicious Content

Hackers will very often use your web server to host malicious files that they can call from other servers. They are essentially quietly using your hosting account as a file server.

What’s in it for the attacker?

The attacker gets to store their files free of charge on a server with a domain and IP address that have a squeaky clean reputation.



Referrer Spam

If you use Google Analytics you are likely familiar with referrer spam. Referrer spam is bot traffic to your site set up to look like it is coming from a fake referrer. The spammer is trying to get the website owner to check out where the traffic is coming from, driving traffic to the site.

What’s in it for the attacker?

As with a lot of the nefarious attacker activities we have already described, they get to use your server free of charge under the cover of your pristine IP address. Their ultimate goal is to drive traffic to one of their websites for reasons that often turn out to be malicious.


Conclusion

If you were of the opinion that your site couldn’t possibly be of interest to hackers, we hope that this post has changed your mind and given you some insight into their motives and methods.

Regardless of what you use your site for, how much traffic it gets or how inexpensive your hosting plan is, an attacker can figure out how to make use of it if they can break in. To learn about how attackers gain access to WordPress sites, check out our blog post from last month.



Originally Posted by Wordfence