Protect or Lose your Privacy

sauce: Ideogram

Introduction

Our lives are heavily impacted by social media sites. We post our moments, thoughts or sometimes revealing secrets. Despite being dangerous, we can still go ahead and do it. Hackers easily acquire personal information to attack us. The intention of this blog is to outline the process that hackers use to access your accounts, measures to shield yourself from such incidences as well as what not to post on the internet. Lastly, I will narrate a story that happened in my life which indicates the importance of this article.

How Hackers Attack

Hackers use many ways to get your information. One common method is Open-Source Intelligence (OSINT). This means they gather data from public sources like social media, forums, and websites. They piece together your posts, pictures, and comments to create a detailed profile. This can lead to identity theft, phishing, and other cybercrimes.

🚨A True Story

I saw an Instagram reel from my schoolmate promoting an investment opportunity. I asked friends about it and found out his account was hacked. The video was a deepfake! Scammers used his Instagram picture to make a fake video. This showed me how important it is to be careful about what we share online. It inspired me to write this article.

I have seen deepfakes of Elon Musk and Mark Zuckerberg promoting suspicions investment companies. Even powerful figures are suffering, so why not us?


⚠️ Deepfake video of Elon Musk


When you share something online, like a photo, it becomes available for anyone to see and use. Even small details can be risky. For example, a Thumbs-up picture of you can be used to copy your fingerprint. Think carefully about what you share, as you can't control who sees or uses it. Always be mindful of your privacy and safety.

How Hackers Use Your Data

  • Phishing: Sending fake emails or messages to steal your data
  • Social Engineering: Tricking you into giving away confidential information
  • Deepfakes: Using AI to create fake videos or images to deceive others

What to Share and What to Keep Private

Share Carefully:

  • Post general updates or hobbies
  • Avoid posting your address, phone number, or daily routine

Think Before You Post:

  • Consider if the information could be misused
  • Avoid sharing your location in real-time

Keep Sensitive Information Private:

  • Never share passwords or banking details
  • Be cautious about sharing documents or IDs

Tools to Protect Yourself

sauce: Canva

1. Email: Use separate email accounts for personal, professional, and spam purposes. This helps compartmentalize your information and reduces the risk of a single breach compromising all your accounts. [Proton mail, Temp mail]

2. Two-Factor Authentication (2FA): Adds an extra layer of security by requiring two forms of identification. [Authy, Google, Authenticator]

3. Password Managers: Helps create and store strong, unique passwords for each account. [Keypass, BitWarden, LastPass]

4. Privacy Settings: Adjust your social media settings to control who can see your posts and personal information.

5. Antivirus Software: Protects your devices from malware and other threats. [Malwarebytes, Norton, Kaspersky]

6. VPN (Virtual Private Network): Hides your IP address, making your online activities more private. [Tor vpn, Nord VPN, Express VPN, Surfshark]

Tips to Stay Safe

Be the Doubter:

  • Verify the origin of a message prior to clicking links or sharing personal details
  • If it seems too good of an offer, think again if it suddenly is

Educate Yourself:

  • Keep yourself updated about the most recent scams and cyber hacking techniques

Limit What You Share:

  • Disclose fewer amounts of your life. Post only what you need and consider possible threats
  • Check your social media profiles to remove old or overly personal information

In conclusion,

Being careful what you post online is important for one’s safety. Utilizing tools like 2FA, password managers, and VPNs can help in ensuring security. Think before you share any personal information while being aware about cyber threats. Therefore, take measures to safeguard yourself because online safety lies within your hands.


Tools used:

ChatGPT - assisted me in writing
Perplexity ai - used for Research
Ideogram ai - created Thumbnail image
Canva - created image

0 Comments

Post a Comment

Post a Comment (0)

Previous Post Next Post