Skip to main content

Modern theft


Yes, in this article we are going to know about hacking and analyze some doubts and questions.

It's a long article. So, I shortened as much as possible to easy for you to understand

First, let's start with one little story!

In a city, once lived a merchant and he had more money and worried about thieves. So he built a locker and asked to test the security issues by hiring some professionals who were experts in breaking lockers and they tested and made some adjustments to more secure. After a week someone broke into the locker and took his money and other priceless things. Tomorrow morning the merchant gathered the city's people to investigate. And small thieves took the chance of the crowd and stole people's pocket money.

Ok now in this theft we can easily understand the hackers in the modern world. The merchant is the targetted company, money is people's money and information, the professional breakers are white hat hackers, the thief who broke the locker is black hat hacker. And the small thieves who take chance in-crowd are scammers.

There are mainly 4 types of people who stole information from us :

1. Blackhat hacker - who broke into a secure system to a network or organization and steals information and money
2. Whitehat hacker - who uses his hacking technique to test the security system and hired by the company to make sure the security (they are like good criminals)
3. Greyhat hackers - who are in between white and black hat hackers and breach security systems with or without permission.
4. Scammers - who are like small thieves interacting with people via calls and messages to stole money and information.

There are different attacking methods and motivation :

1. For money
2. To take vengeance
3. To prove they are worthy (pride)
4. To blackmail
5. Ransomeware attack ( ransomware is like a virus program which makes your computer unusable until you pay the money they ask)
6. Data breach

So, who is a hacker? what do you need as a hacker?

1. A private internet connection with multiple encryptions.
2. Be good at programming a virus or malicious program and best at breaking or find the back door of a secured database.
3. Heavy powered computers and tools depend on your target.
4. Able to delete and reform the entire access process to avoid being caught both digitally and physically.

Major benefits :
1. Hackers in the army can steal an enemy's strategy and plans to protect his home country
2. Reveal frauds of companies or personality

Major disadvantages:
1. They can shut down a part of a country's communications
2. Able to manipulate economic condition by hacking into the stock market or bank
3. Able to start a NUCLEAR WAR.

So they are very dangerous persons online, right?

Is there any chance someone hacks me?

Yes, there is a chance if you are one of the persons mentioned below :

1. Rationalist
2. Politician
3. Business admin
4. Influencer
5. Terrorist
6. Suspicious blacklisted by the government
7. The highest position in any organization.

Looks like you are not one of them.. so be relax and now talk about THE COMMON MAN

So if you're not a special person, you are not a target for hackers. But wait there is more to tell,

There are scammers and some small hackers who are not as much as a hacker but like small thieves as I mentioned in the story before.

It's like a lake full of people as fishes and scammers are throw baits and wait for people to capture. This type of loss happened only by people's greed mind and unawareness of online security issues.

So how are they fishing and what can we do to avoid traps?

Here is some :

1. Use your apps and services via trusted sources only.
2. Don't use unauthorised apps which are downloaded outside of the play store/app store
3. Don't give apps special permission like access to files, camera, messaging, and call details if you think that's not necessary
4. Avoid click baits and fishing links ( messages like click this link to win car/mobile/money)
5. Don't share OTP at any situation. ( That's the last step to steal your money)
6. Girls/women don't leave their phone in the bedroom or near the bathroom
7. Don't share your details on the internet (only if it's a necessary and trusted source)
8. Don't connect public WiFi without a VPN.

Some other popular doubt or questions :

1. Is it necessary to download antivirus apps on mobile?
There is no virus programmed for mobile phones. You may only worry about malware. A virus is a vicious program that is created for computers to destroy files and hardware. But malware is like spies that hide in your directory or within your application and receive orders, send files, call details, messages to remotely accessed thief.

2. What if my phone has malware?
There is no use to install apps like antivirus detectors or something similar. They are all fake. If you doubt about having malware, Go to setting and battery usage. If there are any apps that you are not using and consuming battery just uninstall that. Check for background usage as well. And leave your phone without opening apps turn on your mobile data wait some time and notice if any app running or using your mobile data and uninstall them.

3. Is there is an app monitoring me without any visible notice?
Check if your phone losses battery quickly or heating frequently even though not in use, yes there is a chance you are monitored. Sometimes old phones may have weak battery and heating issues. Now do FACTORY RESET your mobile. If it has any malware they will be deleted if you reset your phone. Even after reset you still have heating or battery draining issue there must be a problem only in the battery. So it's easy to delete hidden monitor apps by a factory reset.

Ok now talk about some hard truths!

As I said before, mobiles are not like pc to get hacked. PC in the old times are immovable and had not much of our information. But nowadays the mobile phone has more information than their parents and friends. A virus is created to destroy computers and malware is used for a spy but at that time there is not much information to be risked to steal.

But mobile phones have no virus but malware. Because your mobile is a copy of you. And it has now a high definition camera, better file speed, internet speed, and even accurate location. So it's a perfect device to spy and it has all the senses except smell. As long as you are available there is a benefit for attackers.

Ok, How good are the company's we trust?
Even if you avoid fishing bait or trapped, I got some bad news for you.

Your ISP (Internet Service Providers) has your photo location, your communication details, and messages. If you are using any kind of device that connects to the internet, you are being monitored.

They have reasons to keep your information, and government and law cannot restrict and there is a benefit for govt as well.

First, your ISP provider stores your information as identification and track down a lost device. Your online service store information as Ad-sense. Yes, your data is sold for providing your ad.

If you think your details are not much value, then I have something to tell you!

Imagine a situation... You are a person who likes pizza and you told about this to your friend and frequently searched for pizza recipe on the internet and you drive the same route every time between your workplace and home.

Now your interest and living are transferred to data. You are a person who likes PIZZA by message and search history. You drive by a similar route every day by your location history. Now, this data converted as a machine database and waiting to match as an ad. Then there is a hotel who sells pizza in your regular route and asks for ad placement in your monitor company. Now your company charges to find a perfect match customer is more likely to be visited. They give your details and push your ad to that hotel.

The bad part is even though you are not visited that hotel, your information is sold for some money to give you an ad. And it's legal to store or sell your information and interest.

Now the important part, How is it possible to sell my information to someone?

Because YOU AGREED TO SELL your information. Yes, that is true.
You ever heard about the TERMS AND CONDITION?

Maybe not because we skipped them and don't read much.
If a company collects or sells your information legally, they mention that on legal TERMS AND CONDITION. That's a key for them to justify that collecting information from you is not a crime.

Conclusion :

There is some way to prevent your data from being stolen. Use VPN (TOR VPN is recommended) VPN connection gives you some advantages over tracking you. And don't use free services. If you use any app or game which doesn't have any ads, don't use them. Because apps without ads are more likely to sell your information to earn money.

I believe you have an answer to your doubts or questions.
If you have any questions or doubts which I am not mentioned above.. please feel free to ask me, I leave my mail id.

πŸ‘‰πŸ»  https://youtu.be/zBnDWSvaQ1I
Its a link to a video about live testing on google ad system and how much they monitor you!

Thank you for reading!

Peace ☮️✌🏻

Feedback

Comments

  1. How did u frame thisπŸ€” ? U know what small thing which make big difference but now a days peoples have not enough time to see this kind of info.. Do more*****

    ReplyDelete

Post a Comment

Popular posts from this blog

Beauty

Everything in this world has it's own beautiness. The word Beauty we use as Adjective as well as Noun. Our brain pickup and judge beautiful things among all the other thing. So the other suitable word of beauty becomes "Catchy". The beautiful things, faces, flowers, animals are similar in some ways. Because every human has their taste and choices to pick or select as their favorite. But beautiful things catch all people. So we can also use Universal-taste as a suitable word. Right? From the beginning of human existence, we need beautiful things in our surrounding environment to enhance our feelings and it gives somehow calm and sometimes excites our emotions. So as before, we suite excitement and enhancement to word Beauty. Ok!? now we end our word game and know what's happening exactly... The scientific reason behind the term "Beauty or Beauti-ness" can be determined by Mathematics and structure. That measurement called the "Golden Ratio". If we ...

Did you ate today?

Hold tight. Because some of the truth might disturb you! We praise the food, donate food, make food, ate food.. without food you cannot live more than 3 weeks. We all have huge respect for farmers. And in the 21st century, you can have millions of various foods that look catchy, tastes wonderful, and mostly make us healthy. Looks delicious πŸ˜‹ , isn't it? But, did you ever not eaten for a day? Or a week? I'm talking about starving not fasting! Not only in Africa, but Every country also has poor people who cannot even get a full meal for them or family!  Even in India, the death rate is not even in this "digital era" like hell. So, looks like money solves the problem here... Then, what about deforestation and agricultural land occupying?...  Hell yeah! There are vertical planting and modern harvesting.. problem solved! (Not really, just imagine. Because that's not gonna happen if you want to feed 7Billion people) Let's get into a story that happened in history!...

Pursuer

One day a girl traveled from Hungary to the USA with only a purse full of money and landed on foreign soil without any huge expectations. But she had what most other people don't have "Curiosity". She kept her curiosity to make the world better and she did it! Yes, it's the story of Katalin kariko a Hungarian biochemist who has stubborn in her research field and science. She had a great track record from the research department, but many thought she chooses not a potential field of research that is mRNA research. she fascinated to work on the mRNA research but people who were funded her thought that she has many talents but she chooses mRNA studies and it's not important and demoted her. Her funds were stopped for research. Despite this bad situation she kept thinking about her studies and strongly believed one day it may have huge potential. so she started with what she had at that time without any second thought.  One day she met Drew Weissman while photocopying...