Cybersecurity

A bad behavior online is hacking and hackers.  Hackers are people who compromise, or destroy computers, phones, tablets, networks etc.  Hackers usually do this for financial gain, for fun, gathering confidential information etc.  Hackers usually hack by putting malware into some ones device, they can do this by emailing them a link, or pretending the link is a useful tool.  Hackers can also manipulate their target so they’re more likely to click the links, and downloads malware.  They can use Trojans, Botnets Rootkits and many more.  Trojans are hacks where the hacker makes the malware look like a legitimate computer program.  Botnets are a collection of bots all working under one network, bots are robots that are programmed to do a certain script, this can involve trying to trick people into installing malware.  There’s a bot herder someone who controlled all the bots.  Finally rootkits is malware that is programmed to hide itself on your computer.  Someone who gets a rootkit on your device (they usually do this trough another hacking attack called phishing or trojans) can remotely control your device.  Rootkits can deactivate security software, spy on you, steal credit card and other important data etc.  Hackers can hack for all different kinds of reasons.  They can do it for financial gain, so stealing your credit card and other banking info.  They can use it to up their reputation in a hacking community, criminal community or just reputation with associates and friends.  Company’s can use it to spy on competition.  These are just a few reasons people hack.  When a hack is successful on a huge corporation it can lower their reputation with customers and deter future customers from signing up with them.  Hacking can also cause small businesses to completely go bankrupt because all customers stop using them, and they’re so small they don’t have a steady influx of business.  Hacking can affect an individual by using up all their money if they get their card information stollen.  It can also cause someone to have to buy all new devices because a hacker got access to their devices and they can’t get control back.  Sometimes cyber criminals are caught it depends on who they hacked.  If a bigger corporation gets hacked I think it’s more likely for the culprits to get caught.  Ways to protect against Hacker is improved cyber security.  For businesses spreading data across multiple networks can be helpful.  Backing up data on the cloud or a hard drive can also be helpful.  Users looking out for suspicious emails or phone calls can also combat against trojans, phishing and rootkits.

“Hacking | What Is Hacking? | How Do Hackers Hack?” Malwarebytes, www.malwarebytes.com/hacker. Accessed 16 Oct. 2022.

“Rootkit | What Is a Rootkit?” Malwarebytes, www.malwarebytes.com/rootkit. Accessed 16 Oct. 2022.

“Trojan Horse Virus | Trojan Horse Malware | What Is a Trojan Virus.” Malwarebytes, www.malwarebytes.com/trojan. Accessed 16 Oct. 2022.

“What Is a Botnet?” Malwarebytes, www.malwarebytes.com/botnet. Accessed 16 Oct. 2022.

Leave a Reply

Your email address will not be published. Required fields are marked *