WARNING: THIS CONTENT IS MEANT FOR EDUCATIONAL PURPOSES ONLY!
Learn the Basics of Computer Security with this video.
This video goes over the differences between Viruses, Worms and Trojans.
The process of placing a fake call to the victims local police department and making a statement which will prompt them to sent a swat team to the victims house or location. Gaining the information about the victim can be done through Doxing.
Swatting has been seen as an ultimate prank by a hacker. But Swatting can be deadly.
Doxing is the process hackers use to find any information about a person, their likes, dislikes, name, address, phone number, family information, place of work, emails and or humiliating photos or videos. It can be used for Harassment, Vigilante Justice, Threats, Humiliation, Online Shaming, Retaliation, Identity theft or Swatting. The process for hackers to get this information could be through social media accounts, phishing, online services like White pages or Zillow.
Phishing is when someone tries to trick you by sending you an email or a download to gain your login credentials. These emails can sometimes be designed to look exactly like an email from your bank asking you to enter in your credentials.The link takes you to a site identical to your bank's, but controlled by the hacker.
USB dropping is when a hacker goes to a business and drops USB sticks around the business to see if someone will plug it in and try to find out whose USB it is. This is used to hack into systems because hackers could implement a virus to automatically run once plugged into a computer. These viruses could steal any kinds of data and even hold your data for ransom.
When hackers gain access to your servers or computer, they can deploy a program that encrypts all of your data and demand that you pay them a set amount of money, usually with Cryptocurrency. If you pay their ransom, there is no promise you will get your data back. To counter this regularly backup your servers and data.
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. (Source)
Carding is a form of hacking which is solely based on the usage of credit cards or debit cards to commit fraudulent acts. These cards are usually bought from a hacker or online store illegally. Credit card numbers can be hacked and sold on the Deep Web for 5 or even 10 dollars, depending on the store.
No, if you search for CVV shops you will find them. CVV shops are hard to come by but one of the most known is called C2Bit. C2Bit is an online store for Credit and Debit cards where you can buy any kind of card, Visa, Master Card or even European cards for minimal amounts of money. They even have their own 24/7 support service based on Twitter.
(Right Side the main page of C2Bit's US cards section)
- Report questionable charges. These charges include $1 fees from a bus or toll fees from other countries. This is a way hackers test your card to see if it works.
- Ask your bank for a new card every few months. This will minimize your risk of a hacker using your card.
- If you have a "Chip Card" look into buying RFID blocking sleeves. These sleeves cover your credit card so if a hacker was to sit next to you on a bus or train, they wont be able to scan your credit card while sitting next to you.
- Use common sense. Your credit card must be protected at all times. Keep it safely and securely in your wallet or purse. Do not leave it out in the open on a table or bench.
This video shows how easy it is for hackers to get your Credit Card information.