web stats service from statcounter

Computer hacking is now done side by side with identity theft. This makes it more dangerous for internet users are hackers often use the backdoor of any computer system to obtain personal information and other sensitive data that they can use to gain profit.


Various methods have been employed by computer hackers to steal the personal information of their victims. Some use malicious software that automatically embeds itself on the computer and acts as keyloggers. These keyloggers record every keystroke punched in the user's keyboard and saved in a log file which are then sent online to its "home base" when the user gets online. Others use phishing emails and fake websites where users are lured into entering their personal information.


So how can computer hacking affect you?


Computer hacking affects the security of your computer. It is a breach to your security measures and are oftentimes, diabolical in nature. Once your computer is hacked, your personal data and other sensitive information saved in your hard drive is exposed and your privacy is ruptured. Your personal details like social security numbers, bank account data and personal photos are exposed which can significantly increase the chances of you being a victim of identity theft. You and your personal data are now vulnerable to manipulation and fraud.


When hackers are able to get into the backdoor of your computer, they can then delete sensitive information that they can get their hands on. Your sensitive personal data can be deleted or manipulated, even your usernames and passwords. Everything that you have saved in your computer can be instantly omitted without your knowledge and you will be left frustrated and disgruntled. Often, after getting all the information that they need, they plant malicious software in their victim's computer that, at the precise moment of "detonation" can cause your computer to crash.


Identity theft can be a by-product of computer hacking as discussed earlier. Identity theft is fraudulent activity that involves another individual posing as another person by using his or her victim's personal information. Simply put, identity theft is using another person's identity without his or her consent for another persons' personal financial interest.


The new advancements in technology has allowed various criminals to use the internet for their illegal activities. Key logging software masked as spywares have become very popular. This particular program tracks and records every keystroke done by the user which then facilitates stealing passwords and other account details. At times, even computer passwords are logged which then enable computer hackers to enable total computer services unavailable to its user. For instance, websites that are hacked cannot be accessed by internet users, even its registered members. This then creates inconvenience on the part of the user, and loss of profits for the site owners. When all these are hacked, account details of members including their personal information. Identity theft then occurs.


Identity theft has never been this serious. Technological advancements, despite the various security measures, are still not capable of eradicating this serious threat with all the hacking activities that prevail.

09 Dec 2010

0 comments:

Post a Comment

:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top