Friday

November 22nd , 2024

FOLLOW US
pc

Owusu Gideon

A year ago

HACKERS USE PHISHING IN OBTAINING INFORMATION FROM PEOPLE ? CYBERSECURITY EXPERT

featured img
News

A year ago



The information age, also known as the new media age, comes with its positives and downsides.


Cybercrimes are predominantly one of such negatives of the era, which has been on the rise globally.


In a quest to create awareness of cybercrimes and cyberattacks, a U.S based cybersecurity expert, Yaw Ansu Gyeabour shared some tips to help people avoid falling victims.


Speaking on JoyNews’ The Law, Sunday, June 11, Mr Gyeabour noted that the whole essence of a cyber-attack is for the hacker to attain administrative privilege to the victim’s device to access salient information such as credit or debit card details.


He explained that hackers typically use cybersecurity tools to target the device from a remote location, gain access to the device, and ultimately obtain whatever information they need to commit the crime (since they usually do not have physical access to the victim’s devices.)


According to Mr Gyeabour, phishing is one of the most common methods used by hackers to achieve this goal.


“[Phishing] is where you receive emails, or these days it has been transformed into text messages, and others. You receive emails from seemingly recognisable institutions that look more like, for example, coming from the Bank of Ghana.


“So, if you don’t pay proper attention to it, they are requesting some salient information like your date of birth. And if you live in places like U.S. and elsewhere, they are looking at your date of birth, they are looking at your Social Security number.


“So, with the phishing, once you click on the email, there are links that you are linked to and those links are infected with malware,” the cybersecurity expert explained.


He further explained that malware is malicious software that allows the hacker to gain access to the victim’s device.In addition, Mr Gyeabour provided a list of some of the most commonly used malware used by hackers, such as files, keyloggers, and ransom malware (ransomware).


Per his explanation, “ransomware encrypts your data and once your data is encrypted, they (hackers) demand huge sums of money to be able to decrypt it.


He further reiterated that phishing attacks do not only take the form of an email but may also take the form of a text message or a phone call.


“So, once you receive a text or a call and there are instructions, press A, press B. Once you click on that, they have access to your system. If it is email. Once you are directed to the email and you click on the email, there are processes that they go, and they have administrative privileges over your device. And in that case, the system is infected with the malware.”


Mr Gyeabour, therefore advised individuals to be cautious of clicking on links in unsolicited messages to avoid falling victim to phishing.

Total Comments: 0

Meet the Author


PC
Owusu Gideon

Blogger

follow me

INTERSTING TOPICS


Connect and interact with amazing Authors in our twitter community