Videos

Published on June 4th, 2020 📆 | 5374 Views ⚑

0

How hacking actually looks like.


iSpeech

Let me show you what hacking actually looks like.
You've probably seen many movies where hacking is portrayed like this - *random windows open, they display random text scrolling very fast, doesn't make any sense*

In this video, let's see what real hacking actually looks like.

Breaches
Believe me or not, your password is probably already out there publicly available on the Internet without even. your knowledge. This might feel a bit unconvincing, but it’s true there is a chance. Even mine existed publicly on the Internet without even me knowing it until recently when I finally found out that my credentials are already stolen and available for literally anyone to see. I had to then change my passwords on all my websites immediately.

Fun fact : There is a breach compilation available on the Internet that contains literally 1.4 billion email password combinations! Think about it! 1.4 billion!

The best way to stay safe from data breaches is to use a different password for every website. Use a password manager like Dashlane to generate random unique passwords for every website you use.
Download Dashlane :

Social Engineering
This is literally, you giving away your username and password to a stranger on the Internet. Hackers can pretend to be someone else to try to extract your critical information like your credentials directly from you.
For example, let’s say you get a link like this from someone , and this link claims that you can get Instagram likes instantly for free of cost. You click on the link, and you’re taken to a very convincing website that claims to offer you free likes for your Instagram posts. If you put your Instagram credentials right there thinking that this is a legit website, well, you’re hacked! This is called Phishing, it is one of the several types of social engineering.

A hacker can also install a RAT on your device through social engineering. A RAT is nothing but a malware that gives the hacker remote access to your device. By installing a RAT, the hacker will be able to do literally anything like, stealing your credentials for different websites with a key logger, stealing your photos and videos, finding your exact GPS location, or even operate your device’s camera or microphone without your knowledge.





My YouTube channel almost got hacked by social engineering :

Man in the Middle attacks
Now, this type of hacking is not very likely to occur, but there is chance that you get hacked by Man in the Middle attacks. In this attack, a hacker can put himself as the Man in the Middle between you and the Internet.
Let’s say you’re browsing Internet from a public Wifi network. Anyone who is using the same wifi network will be able to put themselves as the Man in the Middle, and they can see your Internet traffic, and even modify it.
This means, they will be able to see everything that you are sending and receiving from the Internet using the Public WiFi.
But, as I said, it is very unlikely to happen. Because most websites nowadays use HTTPS connection which means the traffic between you and the website is encrypted, and no Man In the Middle will be able to extract this internet traffic. But you’re still at risk if you’re using a website that doesn’t use HTTPS over HTTP. In such a case, you may want to use a VPN to stay secure while browsing. You can watch the video I made about VPN to know more about why it’s a good idea to always use a VPN , I will make sure to leave the link in the description.

Watch the video I made about VPN :

Support on Patreon :

Follow me on Instagram :
Like my Facebook Page :
Website :
Blog :

Thanks for watching!
SUBSCRIBE for more videos!
source

Tagged with: • •



0 Responses to How hacking actually looks like.