Previous  bell    Next
bell Warning: JavaScript is turned off! Some features on this website will not work without it.

How Your Computer Can Be Hacked

Here is a list of a few simple ways your computer can be hacked. With so many persons going online to do banking, shopping, social interacting and a lot of other things, it is important that we know how to protect ourselves on the internet against cybercriminals like hackers and scammers.
How Your Computer Can Be Hacked
Online Threat Alerts

How Your Computer Can Be Hacked


Rating - Thumb up Rating - Thumb down 0   
How Your Computer Can Be Hacked

Here is a list of a few simple ways your computer can be hacked. With so many persons going online to do banking, shopping, social interacting and a lot of other things, it is important that we know how to protect ourselves on the internet against cybercriminals like hackers and scammers.

Please continue reading below.

A Few Simple Ways Your Computer Can Be Hacked:

  • clicking on a link in a Facebook post, a Tweet (Twitter), an email message, or elsewhere, that takes you to a malicious website
  • downloading pirated or cracked software online embed with malwares like spyware, Trojan horse or Key logger
  • using weak or easily guessed passwords
  • opening a malicious email attachment that contains a virus, Trojan horse or other malwares
  • downloading bogus antivirus software
  • downloading fake software updates
  • allowing an unknown person to access your computer remotely via a remote desktop software
  • not updating your operating system and web browsers
  • browsing the internet without antivirus software installed
  • browsing the internet without a firewall software
  • connecting your computer to an unsecured Wi-Fi connection at places like a coffee shop, hotel or other  Wi-Fi hotspots
  • not protecting your Wi-Fi (wireless) connection with a password
  • allowing the "Auto Run" or AutoPlay feature in Windows, which opens a default program (could be a virus), when a flash/thumb drive is inserted into one of your USB ports
  • allow a stranger to use your computer without monitoring him/her
  • installing a malicious Facebook application
  • entering your user names and passwords on a fake or phishing website
  • giving your user name and password to someone who request it via email or telephone

Remember to leave your comment and read the ones made by others below. And, please report malicious, phishing or scam email messages, social media posts and websites to us. You may click here to contact us, or forward the email messages to: info@onlinethreatalerts.com .

Alert and help your family and friends by sharing this article with them:
Submit Your Comment or Question

Submit your comment or question in the box below to share what you know or to get answers about this article.

CommentComments or Questions (2)