SOCIAL MEDIA

Translate

Showing posts with label Technology hack. Show all posts
Showing posts with label Technology hack. Show all posts


 

 Phone hacking is one of the more sophisticated technical ways of acquiring your personal and financial information. It's not much different than hacking into your computer, because smartphones are just that. Portable, mobile computers. With the increased use of smartphones, how easily accessible the internet has become, along with the advent of social media platforms, it's not hard to see how easily personal information can be shared and utilized to impersonate someone to gain access to other accounts, attached to their name.

 

 

 This is why it's imperative that you be more vigilant than ever, when it comes to safeguarding your stuff; including your identity. Most hackers and scammers tend to go for the easiest target first, and then work their way up, from there, in terms of level of difficulty. This happens as a result of what the hacker stands to gain from successfully accessing your financial and personal information. Since this is a never-ending always evolving practice, I have listed below some pointers' that suggest your device might have picked up some malware that aids in transmitting your information, unknowingly, thus making you an easier target. 

 

 

If you notice your phone is running slower than usual- While this can be the result of several things; normally you can pinpoint the exact chain of events that lead to your phone slowing down, overtime. Whether's it's accumulated updates throughout the lifetime of ownership of your device, the amassed data, that's stored on your phone from all of the apps downloaded; or even the regular data that's taking up space such as pictures and other files. In the absence of these factors, your phone slowing down suddenly and tremendously is a good indicator that malware or spyware is on your phone and feeding your info to an external source. That process is what is causing/ contributing to the degraded performance of your phone.  

 

 


Your phone either heats up or overheats quickly- Temperature variables aside, similar to the previous point, if you notice your phone is heating up quickly and you're not overclocking, over utilizing or running a resource intensive application or game on your device, chances are whatever malware/spyware that's on your phone is feeding your information back to the host, externally. This action can contribute to the high temperatures being generated, while seemingly being in normal use by you.  

 

 

You are getting strange pop-ups, multiple unsolicited ads- If you're surfing the interwebs, on your device and notice that the websites you normally visit have more frequent and pervasive ad's and pop-ups, and there is a marked difference between your experience's there. This can indicate that something has downloaded on your phone is running in the background causing this distortion, to how it normally operates.  To test this, I often suggest going to the same website on other devices to see if the changes on your device, appear elsewhere. If so, then the website is to blame, if not, then run a virus scan on your phone immediately.


 

 

Frequently visited websites now look different in your browser-This is a dead giveaway that you have a virus or some form of malware on your device. If you notice that websites you frequently visit all of a sudden look "different", are redirecting to another website or just isn't loading or operating the way it used to before; your device is definitely infected with malware and you need to run a virus scan immediately.

 

 

You notice strange phone numbers, texts and e-mails that you didn't originate- Also includes seeing mysterious apps appear on your phone, where  you have no recollection, of downloading them. Often times, if a person has been hacked, this symptom is what I call the "calm" before the storm. Reason being is because by the time things get to this point, the hacker already has other personal information, from your device, in their possession.

 

 

Aside from running a virus scan immediately I highly suggest you check all of your bank and financial accounts (on another non-infected device) and put a lock on any and everything that may be accessible to anyone who has your username and password or any information, they can use to that end. This is a good time to change passwords and set up multi-factor authentication, including resetting your phone back to a factory reset.

 

 

While I personally advice having your data backed up and syncing elsewhere to a cloud account, I suggest this level of caution, as whatever is feeding your information to a third party; needs to be stopped immediately. While not knowing to what extent the damage that was done; the sooner we mitigate it, the better off you'll be.  

 

 

While this gives you a brief overview of how to avoid being hacked in general, you can still utilize the tips here to better protect yourself behaviorally, no matter what device you use. There are a few anti-virus software options (some are free) that you can employ to help scan for malware, spyware and worms and other viruses' on your desktop and mobile devices in addition to helping to get rid of them. One that I often employ is Avast. McAfee and Norton are also two other choices to pick from. These brand's have options that are available for download on both your laptop, desktop and mobile devices.

 

 

 

While surveying the habits and patterns that often put you at risk, I implore you to make the behavioral changes, as soon as you become aware of them. The quicker you implement what you learn, the faster it sticks and the more beneficial it is to you in the long run. There's always something you can do to protect yourself from being a target and making it harder for hackers to easily glean your personal information. For a shorthand way to keep these reminders accessible to you, please refer to the checklists below that denote if your mobile device has been hacked. 

 

How to tell if your Android is hacked

How to tell if your iPhone is hacked


How to tell if your phone's been Hacked.

26.10.22

 

 

When I first started my blogging journey, I dived head first into the world of web design in the form of my own blog website layout. I didn't make any of the website themes, as I purchased them from an online marketplace; however, I did get pretty familiar with the HTML coding once I started editing the layout and colors to my liking.

 

My background in tech made me all the more willing to "get my hands dirty" and learn something new. While my zeal for this new endeavor, sustained me; it also carried me through all of the long nights, setbacks, roadblocks, and delays. 

 

It wasn't all hard times, though, as I've had more joy and triumphs every time I figured out how to resolve a tech issue on my own and received more inspiration to edit and make my website better and more visually interactive.

 

I must say I am pleased with the final result, as every account opened, software used, and new ideas explored were all used in tandem with each other. Nothing went to waste, and everything fit together. The software I used for one of the sections on my website is mentioned below.

 

If you ever find yourself wanting to create a website of your own and would like to make any of your pictures "clickable" to another link, consider using this website.

 

 

While there are other websites out there that do a similar job to this one, I liked this one because not only was the website easy to use and the sign-up process for a free account was quick and seamless; but they have a brief tutorial video readily available to show you what to do.

 

The fact that they have a live chat agent; that proactively pings you to offer assistance, and responds immediately upon your interaction with it, was also a nice touch. 

 

I utilized this website to attach the image of my checklists to the printable PDF document needed to utilize it physically. It was very easy to fill out the information required for the generated links, and it safely redirected you to a working copy of my checklist.

 

You can also use this website to make image cards that lead to any URL you'd like, including your own company's website, social media page, or any hosted document you'd like to share. For the latter, make sure you change the sharing permissions of the document before linking it, so everyone who wants to access it can do so easily.

 

Whether you're ready to design a website or blog of your own, or just working on a presentation and want to give your slides a little extra flair by having the images on it, lead elsewhere when clicked, give this website a try and make your projects that much better.

 




How To Create Clickable Photos

21.7.22

 


 Credit Card Scams are an all too commonplace issue. The frequency of this doesn't always stem from anyone's laziness or incompetency with safeguarding their stuff. While you may be putting forth your best efforts; there are cracks, loopholes, and technicalities, that can leave you exposed to being exploited by even the most amateur of scammers. 

 

 

I didn't realize how easily information can be stolen until an incident happened that hit home. While I was reeling from the loss of a colleague, who was my direct report, my friends and I decided to head out to dinner on a Saturday night to lift my spirits a bit. We went to a boathouse in West Orange, NJ and overall we had a great night. 

 

 


So imagine my surprise when my friend alerted me, six days later that someone at that restaurant had "skimmed" his card information and decided to purchase $8,000 dollars worth of Versace merchandise. I saw the screenshots and was appalled. I immediately went into warrior mode and threatened to sue the establishment.

 

I felt an overwhelming sense of guilt and anger, as I was the one who picked the place. It was all our first time there and  I loved the ambiance and the view of the lake. So for that memory to be tarnished like this, didn't sit right with me. 

 

 

 

I visited the restaurant the next day and spoke with the manager on shift about the incident. They were very understanding and concerned and I explained the issue while taking care not to directly place blame on our waiter that night, as we really have no proof that it was them.

 

 

The manager understood the necessity of addressing this issue and putting this complaint on file.

 

 

If the perpetrator gets away with doing this and isn't put on notice it will become a pattern and damage the restaurant's reputation, if this news gets out.  I exchanged the contact information for both the on-shift manager and the regional manager with my own as well as my friends'.   

 


Instagram