Hacker reveals what you need to stop doing online

Hacker reveals what you need to stop doing online

  • English
  • Български
  • Русский

Hacker reveals what you need to stop doing online

 

Hacker reveals what you need to stop doing online

One Tip: Before posting a photo, note the backdrop
 
 
Stephanie Carruthers is a "white hat" hacker, known as Snow, and its customers are both well-established companies with many years of experience and start-ups. In 2014, she won the Capture the Flag in DEF CON, one of the biggest and old hacker events in the world. She often visits such conventions and shares her business experience hoping to improve online security.
 
Here's what she told the Huffington Post about her work and the most stupid mistakes people have ever seen on the internet.
 
"I do not think I will ever feel safe online," says Stephanie Carruthers
 
What exactly is a hacker white hat?
 
"White Hat" is an ethical hacker that companies hire to check their online security. My job is to show my customers where their vulnerabilities are, so they can fix them before they find a real attacker.
 
How safe do you feel personally online?
 
I would never say I am invulnerable. Data tracking is happening so fast that I do not think I will ever feel safe online. Therefore, I take steps to protect myself as much as possible.
 
 
What are some of the silly things you've seen people publish online?
 
I try not to characterize things as stupid, but uneducated. I hope that if someone understands the risk of content they publish online, they will rethink their decision.
 
Given this, some of the dangerous things I've seen people do are:
 
- Beginning Drivers: Excited youngsters (or proud parents) who take pictures of newly issued driving licenses, these documents show all their personal information, including their home address.
 
- Newcomers: Homeowners make an artistic photo of their new key and mark the location of the home without realizing how easy it is to remove a duplicate of the key just by a photo.
 
- Employees: A picture of a group of colleagues at their workplace is often uploaded online without paying attention to the background, where there may be a white board with passwords, luminous monitors with confidential information, keyboards with important phones, a pay slip, n. While some do not see a bad picture, malicious people can easily take advantage of it.
 
Hackers are attacking smartphones for "digging" crypto
 
Hackers dig cripples through infected archives
 
What should people never do in social media?
 
Publish without thinking. Before posting something, ask yourself the following questions: What information do I post online? What's in the background? If I wanted to hurt myself - how would I use this information against myself?
 
In your opinion, which of the social media reveals the most information about us?
 
I think Facebook displays the most information - mainly because it connects a huge amount of data like your friends, colleagues, family, work, your hobbies, your kids, and so on. Many of the answers to security issues used for banking transactions and password recovery can only be found by looking at someone's Facebook account.
 
"Lie when answering common security questions.
 
Can face detection technology stop creating fraudulent profiles from scammers?
 
Face Detection Technology can help reduce some fraudulent bills, but it will not end them. Hackers are very smart and enjoy discovering ways to overcome new obstacles. It's like playing cat and mouse. To use this feature, we first need to provide additional information on Facebook. I know a lot of people who value their privacy to a point where they use fake names and abstract photos in social media. To prevent the creation of a fake account, they will need to provide Facebook their name and face. This is similar to Facebook's idea of ​​how to fight porn against revenge by asking for a naked picture. (users who fear that a former partner might abuse such pictures can send them to Facebook, and the company promises that they will be subjected to a special treatment that will make them a unique digital footprint This will help identify and block others trying to upload the same photo.) If they have such photos, it makes it easier to search for and destroy them from an automation point of view. However, we return to the question of trust and which is less than two evils.
 
How face recognition works
 
Facebook, Google and other IT giants will share user data
 
Passwords and Security Issues: Why are there so many violations?
 
Data tracking can occur for several reasons, such as social engineering attacks, application vulnerabilities, inappropriate servers, lack of physical
 Hacker reveals what you need to stop doing online
 Hacker reveals what you need to stop doing online
All fields are required. Please fill the verification code