Thursday 9 November 2017

Cyber Security and personal Identity theft Safety Tips

Cyber Security and personal Identity theft Safety Tips...
Have you ever sat and wondered how your passwords, Bank accounts,emails and social  network accounts are hacked? Answer is very Simple, You unknowingly expose your device  to intrusions from malicious cyber criminals via web links that installs key-loggers and  other spy-ware softwares sent to you in the guise of financial institutions, social  network site administrators and so many other ways they device to make sure the ,malicious  software is installed on your PC remotely or on site.

How Does that Happen?
Your Bank will never ask you to verify your Bank Verification Number(B.V.N), input your credit card information or  change/verify your passwords on-line so when you see any message you suspect to be from  your bank but is asking for private informations to give you access to certain features  or cancel certain loans you never applied for, please do not even think of clicking the  link cos it might be a monitor software written to monitor keystrokes of your keyboard  and hence expose your system to attack.
Whatever be the case if you are using a computer having key-logger installed, you are at  serious risk of loosing sensitive information which can lead to financial loss also. Even  if its your computer, it may have been used by some creepy friend of yours who have wrong  intentions to steal your data.

What is a Key-logger: 
A key-logger is a piece of generally-malicious software or hardware installed on your  computer that logs what you type, including your passwords; many key-logger programs also  do other forms of surveillance on you. While they may be legitimately used in rare  circumstances, they can also be used by cyber criminals to steal the personal information  and passwords of unknowing Internet users. Key-loggers breach your privacy, allow your  passwords to be stolen, and cause your computer to slow down. Thus, if you believe you  are being illicitly monitored by someone else using a key-logger, you may want to try to  detect and remove it.

Preparing Against Malicious Key-logger Attacks:
1. Ensure the system is fully protected from any known vulnerabilities. Update your  operating system as well as your applications. Outdated software may have exposed  security holes that can open your computer up to infection.
2. Make sure that all users of the computer know not to click freely on the internet,  especially pop-ups, and avoiding freebies at all costs.
3. Install reputable security software on your computer. Install both an on-demand anti- malware and an always-on anti-virus. Free options include "Malwarebytes (for malware)" and  "Avast" or "Panda" (for anti-virus). Keep your security software updated.

Detecting Key-loggers:
1. Open the Task Manager by pressing "Ctrl+Alt+Delete" and selecting "Open Task Manager".  Check the task manager window for suspicious processes; search the names of unknown  processes on the Internet to see if they might be malicious. If there is a suspicious  process in your computer, then it might be a key-logger or some other type of virus.
2. In the Start menu's search bar, type in "msconfig" and press enter. Go to "Startup",  and see if there are any suspicious programs that are configured to start up when the  computer boots. If you are suspicious about a program, search for its name on the  Internet to see if it might be malicious.
3. Do a double check. Many key-loggers hide themselves from both msconfig and the Task  Manager. Use your reputable anti-malware to check for key-loggers on your computer.
4. If you have a desktop computer, it may also have a hardware key-logger on it. Look at  where your keyboard cable connects to your tower. If there is a device plugged in between  the keyboard cable and the tower, it might be a hardware key-logger. Please note, however,  that it may also be a legitimate converter or device.
Removing Keylogger:
1. If the keylogger detected is visible as an entry on the list of programs in the  Control Panel, then it might be a legitimate keylogger program with an uninstaller.  Uninstall the program, and use an anti-malware to remove any remnants.
2. Try an uninstaller. With some keylogger programs, such as Logixoft's Revealer  Keylogger, the installer can be used to uninstall the keylogger. Download the installer,  and use that to uninstall the keylogger. Remove remnants of the keylogger using a  reputable anti-malware scanner.
3. Search for specific advice for different programs, by name. Some keylogger programs,  such as Refog, actively prevent uninstallation. Check on internet forums such as  "BleepingComputer" to see how you can remove the program without breaking your computer.
4. Consider reinstalling your computer's operating system.
Many keylogger programs hook deep into your operating system, meaning that attempts at  removing them might break your computer or cause instabilities. In these cases, a  reinstall might be easier and cause fewer headaches.
Sometimes, it can be hard to remove a keylogger program using antimalware alone. A  reinstall would take care of the keylogger without you needing to put in as much effort.
You should reinstall your operating system if you have detected a keylogger on a computer  that you plan to use for bank transactions or dealing with trade secrets, because the  keylogger might not have been completely removed.

More Tips:
If you have used your computer to do bank transactions, your passwords may have been  compromised. Immediately, change your passwords using a computer known to be safe.  Contact your bank if you see any suspicious transactions done using your account.
Warnings:
Certain key-logger programs are invisible to anti-spy-ware and firewall programs.

No comments:

Post a Comment