{"id":5058,"date":"2018-08-16T19:37:47","date_gmt":"2018-08-16T14:07:47","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5058"},"modified":"2021-02-24T14:51:32","modified_gmt":"2021-02-24T09:21:32","slug":"what-is-computer-hacking-and-its-prevention","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/","title":{"rendered":"Computer Hacking &#8211; What are they and how to stay protected?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5048 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg\" alt=\"computer hacking\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking-300x138.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking-225x104.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams, instant messages or spam email and bogus websites in order to deliver dangerous malware to your computer and compromise your computer security.<\/p>\n<p>If you are not protected by a <a href=\"https:\/\/personalfirewall.comodo.com\/what-is-firewall.html\" target=\"_blank\" rel=\"noopener\">firewall<\/a>, these hackers can also make attempts to access your computer and private information directly. They will be able to monitor your conversations, examine the back-end of your personal website and also install malware. Protecting your computer from hackers is thus a growing concern that can be achieved by installing reliable antivirus software and other virus protection measures.<\/p>\n<p><strong>Hackers can do the following things with your computer:<\/strong><\/p>\n<ul>\n<li>Ruin your credit<\/li>\n<li>Make purchases<\/li>\n<li>Obtain cash advances<\/li>\n<li>Use and abuse your Social Security number<\/li>\n<li>Hijack your passwords and usernames<\/li>\n<li>Steal your money and open bank accounts and credit card in your name<\/li>\n<li>Sell your information to other parties who will use it for illegal purposes<\/li>\n<li>Request new account Personal Identification Numbers (PINs) or additional credit cards<\/li>\n<li>Add themselves or an alias that they control as an authorized user so it is easier to use your credit<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Tips on how to stay protected from computer hacking activities:<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Install, update and use antivirus software<\/strong><br \/>\nInstalling <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> is an extremely important measure that will help in <a title=\"Virus Protection\" href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">virus protection<\/a> and malware prevention, but not everyone bothers to do it.<\/p>\n<p><strong>Check link locations<\/strong><br \/>\nUnknown messages carry links to unknown sites. You will end up facing unintended consequences if you surf a mysterious website. These sites could be unsecured or infected with malware. Copy and paste the link location into a new browser to see what site is on the other side. Encrypted sites are the safest ones to visit because you know they are safe when you see HTTPS in the URL and the lock icon on your browser.<\/p>\n<p><strong>Turn on the Windows firewall<\/strong><br \/>\nWindows has an inbuilt firewall that safeguards your PC from unwanted attention through the internet. This software firewall is enabled by default and functions alongside any hardware firewall that is built into your home broadband router. Check its settings by typing \u201ccheck firewall\u201d in the Start menu search box and selecting Check firewall status from the results. Three green tick marks highlight that the firewall is normally working, if not, select each one to turn the firewall on.<\/p>\n<p><strong>Use the most recent version of your web browser<\/strong><br \/>\nWeb browsers are critical applications, but just like other software, they can also contain bugs. Hackers are quick to capitalize on these and develop bogus websites with data designed to exploit them. After compromising a web browser in this manner, a hacker will be able to monitor everything you type, starting from credit card numbers to passwords. Hence, it is essential for you to use the most recent version of your web browser as this will help prevent computer hacking attempts and other related issues.<\/p>\n<p><strong>Use two-factor authentication<\/strong><br \/>\nOnce hackers obtain your passwords, they try to study which personal accounts they can access with the stolen data. Two-factor authentication is considered to be an efficient way of stopping attackers who have stolen passwords. An increasing number of companies are now making it standard for logging in. For two-factor authentication, users will have to enter a password and also confirm entry with another item like a code that is sent to a phone.<\/p>\n<p><strong>Use advanced passwords<\/strong><br \/>\nA strong password includes lowercase, uppercase, punctuation, numbers, and special characters. Don&#8217;t store a list in a saved file and refrain from making the password a personal reference. Never use the same password for multiple accounts.<\/p>\n<p><strong>Be suspicious of emails<\/strong><br \/>\nWhen you receive phony emails ensure to check the email address to see if they match with the website you think it is from. You can also check the IP address of the sender in order to be extra cautious. This can be done by finding the source information from the email and then looking for the IP address that follows the line &#8220;Received: from.&#8221; Google the IP address in order to learn the email&#8217;s source.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/coronavirus-push-lokibot-trojan-malware-unsuspecting-users\/\">Hackers Coronavirus Malware<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-browser-hijacking\/\">Browser Hijacker<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\"><strong>Best Virus Removal<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-for-mac.php\">Mac Virus Removal<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" rel=\"noopener\">Website virus checker<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/best-it-management.php\" rel=\"noopener\" target=\"_blank\">Best IT Management<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams, instant messages or spam email and bogus websites in order to deliver dangerous malware to your computer and compromise your computer security. If you are not protected [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[12,215,216],"class_list":["post-5058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-antivirus-software","tag-computer-hacking","tag-hacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Hacking | What is it and methods to prevent it<\/title>\n<meta name=\"description\" content=\"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Hacking | What is it and methods to prevent it\" \/>\n<meta property=\"og:description\" content=\"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-16T14:07:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T09:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/\",\"name\":\"Computer Hacking | What is it and methods to prevent it\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg\",\"datePublished\":\"2018-08-16T14:07:47+00:00\",\"dateModified\":\"2021-02-24T09:21:32+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg\",\"width\":650,\"height\":300,\"caption\":\"computer hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Hacking &#8211; What are they and how to stay protected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Hacking | What is it and methods to prevent it","description":"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Computer Hacking | What is it and methods to prevent it","og_description":"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-08-16T14:07:47+00:00","article_modified_time":"2021-02-24T09:21:32+00:00","og_image":[{"width":650,"height":300,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/","name":"Computer Hacking | What is it and methods to prevent it","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg","datePublished":"2018-08-16T14:07:47+00:00","dateModified":"2021-02-24T09:21:32+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Computer Hacking know what is it and here are the tips to stay protected. Better prevent hacker activities by employing robust antivirus software.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/08\/computer-hacking.jpg","width":650,"height":300,"caption":"computer hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-computer-hacking-and-its-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computer Hacking &#8211; What are they and how to stay protected?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5058"}],"version-history":[{"count":25,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5058\/revisions"}],"predecessor-version":[{"id":15920,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5058\/revisions\/15920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5048"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}