Hashing algorithm is used to protect the passwords in your system. Hackers use different types of techniques to access these passwords. The most popular technique is known as the dictionary attack where the computer tries over and over in a loop. With time, hackers are trying new tactics with modern security systems.
If you connect your computer or phone devices with an open Wi-Fi source that does not require password, it is a door to access all of your files. Each and every activity can be monitored by a hacker on this Wi-Fi network. If it becomes necessary to use open Wi-Fi like hotspot, make sure that you use VPN in order to secure the Wi-Fi channel so that hackers cannot hack password.
You have to ensure that you use WPA or Wi-Fi protected access rather than WEP because it cannot be easily hacked by any hacker. Once you will switch to WPA, the properties will also be changed on router’s webpage. Many hackers use WPS or Wi-Fi protected setup in order to access the Wi-Fi passwords even if you are on WPA. Hence, it is better to turn off the WPS method of authentication.
If you access a website that does not have a lock symbol, it can be easily used to get information from your system without any authorization. This method is popularly known as the MIM attack or man in the middle attack.
Do not install unknown program
While installing a program, computer might give you a warning that it is an unknown program. These programs have certain malware, viruses and bugs whose name you have not heard of but have the capability to cause some serious damage to your computer. If you have allowed something in your computer, make sure that you delete your piece of software. If you have an anti-virus installed, you have to run a thorough scan before installing anything.
If you link your twitter, Facebook or any other social media account to a suspicious site, such sites will gain access to your personal information which can be conveniently used against you. If any site requests to link your social media account, think twice before doing it. You must do it only when it is an absolute necessity.
Hackers usually find a flaw in social media websites to access your account. Hence, you have to make sure that you do not link your phone number with the social media accounts.