Cyber Security Secrets Hackers Don’t Want You to Know

Computer hackers have lots of tools to threaten your internet security, but these tips from cybersecurity experts can help protect your privacy.

1 / 18
cybersecurity secrets - keyboard
Kite_rin /Shutterstock

We send incredibly personal emails

Spear phishing, the act of sending targeted emails to get you to share financial information or passwords, can be exceptionally sophisticated. “The old-style ones had spelling and punctuation errors, but today, it has really become an art,” says Mark Pollitt, PhD, former chief of the FBI’s computer forensic unit. “They may call you by name, use your professional title, and mention a project you’re working on.”

Outsmart us: Spot phishing emails by looking for incorrect or unusual URLs (hover over links to see the actual URL address), requests for personal information or money, suspicious attachments, or a message body that’s actually an image. Unless you’re 100 per cent confident that a message is from someone you know, don’t open attachments or click links.

Here’s how one man fell for an email scam.

2 / 18
cybersecurity secrets - laptop
Dusan Petkovic /Shutterstock

We’ve got all the time in the world

Hackers have programs that systematically test millions of possible passwords. “They go to sleep and wake up in the morning, and the program is still going, testing one password combination after another,” says Peter Fellini, a security engineer with Zensar Technologies, an IT and software services firm.

Outsmart us: Instead of a password, try a passphrase. Use letters and characters from a phrase and include special characters, numbers, and upper- and lowercase letters (Mary had a little lamb could become mh@Ll, for example). Or consider a password manager that generates and remembers random, difficult-to-crack passwords. (Even then, some experts recommend unique passphrases for financial accounts in case the password manager gets hacked.)

These are the 25 worst passwords you could possibly choose.

3 / 18
cybersecurity secrets - web-surfing
GaudiLab /Shutterstock

We sneak while you surf

A growing number of cyberattacks are arriving via “drive-by download,” says Giovanni Vigna, PhD, a computer science professor at the University of California at Santa Barbara and co-founder of anti-malware provider Lastline Inc. “You visit what looks like a perfectly harmless website,” he says, “but in the background, you are redirected to a series of other sites that send you an attack.” Often even the website’s owner doesn’t know the site has been compromised. Although search engines keep blacklists of known malicious sites, the bad sites are continuously changing.

Outsmart us: Make sure you install all available updates to your browser or use a browser that automatically updates, like Firefox. Vigna’s research has found that Internet Explorer users are most vulnerable to these attacks.

Here are more secrets to steal from people who never get hacked.

4 / 18
cybersecurity secrets - baby-monitor
Saklakova /Shutterstock

We can infiltrate your baby monitor or smart TV

Remember, your smart device is essentially a computer—and chances are, it’s not a particularly secure one. Anything in your house that’s connected to the internet, from your smart fridge to your climate-control system, can be hacked. In several recent incidents, hackers were able to hijack a baby monitor and yell at a baby. Experts have also shown how hackers can turn on a smart TV’s camera and spy on you.

Outsmart us: When setting up smart devices, always change the default password. Most of these devices work from your wireless router, so password protecting your Wi-Fi can also help. Keep up with firmware updates; many devices will inform you when there’s an update available. Otherwise, look for an Update Firmware option in the main menu or settings.

Here’s how to tell if someone has hacked your Wi-Fi.

5 / 18
cybersecurity secrets - phone
GaudiLab /Shutterstock

We eavesdrop on free public Wi-Fi networks

Even if you’re connected to a legitimate public network, a “man-in-the-middle” attack can allow hackers to snoop on the session between your computer and the hot spot.

Outsmart us: Avoid public Wi-Fi if possible, especially unsecured networks without passwords, advise security experts at MetLife Defender, a personal data protection program. Instead, set up your smartphone as a secure hot spot or sign up for a VPN (virtual private network) service. If you must use public Wi-Fi, avoid financial transactions and consider using a browser extension like HTTPS Everywhere to encrypt your communications.

Find out 14 things you should never do when using public Wi-Fi.

6 / 18
cybersecurity secrets - Facebook
Natee Meepian /Shutterstock

We lure you with “shocking” videos on Facebook

A friend just posted a video of an “unbelievable animal found in Africa.” If you click to watch, you’re asked to download a media player or take a survey that will install malware on your computer, says Tyler Reguly, manager of security research at the cybersecurity firm Tripwire. It also shares the video with all your friends.

Outsmart us: Type the video’s title into Google and see if it’s on YouTube. If it’s a scam, someone has probably already reported it.

Find out why you need to stop commenting on those viral Facebook memes.

7 / 18
Denys Prykhodov /Shutterstock

We take advantage of your typos

Fake sites with slightly altered URLs like or look surprisingly similar to the real site you meant to visit, but they’re designed to steal your data or install malware on your computer.

Outsmart us: Double-check the site’s address before logging in with your name and password, especially if the home page looks different. Check for https in the address before typing in your credit card information.

Make sure you never store this on your smartphone.

8 / 18
password /Shutterstock

We crack your password on “easy” sites

A recent study found that about half of us use the same password for multiple websites, making a cybercrook’s job easy. “A hacker will break into a soft target like a hiking forum, get your email address and password, and then go to your e-mail account and try to log in with same password,” says Marc Maiffret, chief technology officer at BeyondTrust, a security and compliance management company. “If that works, they’ll look to see if you have any emails from a bank. Then they’ll go to your bank account and try that same password.”

Outsmart us: Use two-factor authentication, a simple feature that requires more than just your username and password for you to log on. In addition to your password, for example, a site may require you to enter a randomly generated code sent to your smartphone to log in. Many companies—including Facebook, Google, Microsoft, Apple, and most major banks—now offer some form of this safeguard.

Here are three times you shouldn’t accept cookies on a site.

9 / 18
Sviat Studio /Shutterstock

We love your Bluetooth headset

If you leave the Bluetooth function enabled after using a hands-free headset, hackers can easily connect to your phone, manipulate it, and steal your data.

Outsmart us: Always turn Bluetooth off after you use it. Set your visibility to “off” or “not discoverable,” and require a security code when you pair with another Bluetooth device.

Don’t forget to keep your car safe—follow these car security tips to protect your ride.

10 / 18
Syafiq Adnan /Shutterstock

We can easily break into routers that use WEP encryption

Many older routers still rely on a type of encryption called WEP (Wired Equivalent Privacy), which can easily be cracked with a widely available software program that anyone can download.

Outsmart us: Make sure your router uses WPA2 (Wi‑Fi Protected Access 2), the most secure type of encryption, or at least WPA. Click your computer’s wireless network icon to check the security type. If your router doesn’t give you one of those choices, call your router manufacturer to see if you need to do a firmware update—otherwise, plan to get a new router. Don’t forget to change your preset Wi-Fi password, since any good hacker knows the default passwords for all major routers.

Here’s what you need to know about Canada’s 3G network shutdown.

11 / 18
Bloomicon /Shutterstock

We impersonate trustworthy companies

You may get a fake financial warning from your bank or credit card company, order confirmation from a retailer, or social networking invitation.

Outsmart us: Remember, most companies never ask you outright for your account information. You can sometimes spot this type of scam by hovering over the address in the From field or by hitting Reply All and looking for misspellings or strange addresses. Also, check to see that the e-mail was sent to you and only you. If you’re not sure it’s legit, call the company instead.

Find out how to prevent identity theft in five simple steps.

12 / 18
279photo Studio /Shutterstock

We debit tiny amounts—at first

Cyberthieves may test-drive a stolen card number by running a small charge under $10 to see if anyone notices.

Outsmart us: Check your transactions online regularly—even daily. If you spot a charge you don’t recognize, report it immediately to your card issuer.

Here’s what a hacker can do with just your phone number.

13 / 18
Pabkov /Shutterstock

We hacked that ATM you just withdrew cash from

Crooks install cleverly disguised “skimmers” to steal your card information, while a hidden camera or a thin skin over the keypad captures your PIN.

Outsmart us: Try to use ATMs inside banks, where it’s tougher for criminals to install these devices, and inspect the machine carefully before you use it. “Whenever I use an ATM, I give the area where you insert the card a little tug to make sure it’s secure and is really a part of the machine,” Fellini says.

Find out how to clear cookies from your phone (and why you should).

14 / 18
arisara /Shutterstock

We count on your downloading our free, fake versions of popular apps

These apps steal confidential information or bypass your phone’s security settings and subscribe you to premium services. “You choose the free version of a game, it asks for all sorts of access, and you say ‘yes, yes, yes’ to all the permissions,” Vigna says. “The next thing you know, it’s sending premium SMS text messages and stealing your money.”

Outsmart us: Before installing an app, check the ratings and number of people who have installed it—hackers can fake positive ratings, but they can’t stop other posters from warning that the app is a trick. Most fake apps have to be downloaded straight from a website, so make sure you always download from an official market like Google Play or Apple’s App Store.

Here are the password mistakes hackers hope you’ll make.

15 / 18

Jaromir Chalabala /Shutterstock

We love that you always leave Wi-Fi on

Though it’s convenient to leave Wi-Fi turned on while traveling with your laptop, tablet, or smartphone, your device will constantly try to connect to known networks. Attackers can identify those and set up rogue networks that impersonate them.

Outsmart us: Get in the habit of turning off your Wi-Fi every time you leave your home.

Here’s why you should never charge your phone in a rental car.

16 / 18
Georgejmclittle /Shutterstock

We fool you with bogus software updates

You know you’re supposed to update your software to protect it, but hackers may send you fake updates that actually install malicious backdoor programs on your computer.

Outsmart us: If you get a pop-up message about an update, go to the software provider’s actual website and check to see if it’s real. You can also try closing your browser to see if the pop-up disappears—if it does, it may be a fake.

Make sure you never post this on social media.

17 / 18
Kostenko Maxim /Shutterstock

We can crack supposedly safe retailers

Experts say big brands will continue getting hacked until retailers can better protect their data. Hackers sell your information on the black market, and other criminals then use it to make counterfeit cards that can be used for shopping.

Outsmart us: Don’t save your financial information when you shop online—check out as a “guest” when you can. If you fall prey to an attack, ask your bank to issue you a new credit card, take advantage of any credit monitoring that’s offered, and scrutinize your statements.

Discover more tips for safer online shopping.

18 / 18
Jacob Lund /Shutterstock

Safety in real life

Readers who recovered from or prevented a cybercrime share their advice:

Try not to apply for credit cards online: Credit card companies require your social insurance number. Once you put that out there, it’s out there forever. —Christine Mumper, via email

Avoid debit cards: They allow hackers much easier access to bank accounts than credit cards do. Also, when logging in to an online account, never check the box that says “Remember me.” It takes only a couple of seconds to type in your username and password each time, and you don’t want that information “remembered.” —Rick Kane, Collettsville, North Carolina     

A cybersecurity expert from MetLife Defender helped review and select the best reader tips.

Next, check out the latest online scams everyone’s falling for.

Reader's Digest
Originally Published on Reader's Digest