1. We send incredibly personal e‑mails.
Spear phishing, the act of sending targeted e-mails to get you to share financial information or passwords, can be exceptionally sophisticated. “The old-style ones had spelling and punctuation errors, but today, it has really become an art,” says Mark Pollitt, PhD, former chief of the FBI’s computer forensic unit. “They may call you by name, use your professional title, and mention a project you’re working on.”
Outsmart us: Spot phishing e-mails by looking for incorrect or unusual URLs (hover over links to see the actual URL address), requests for personal information or money, suspicious attachments, or a message body that’s actually an image. Unless you’re 100 percent confident that a message is from someone you know, don’t open attachments or click links.
2. We’ve got all the time in the world.
Hackers have programs that systematically test millions of possible passwords. “They go to sleep and wake up in the morning, and the program is still going, testing one password combination after another,” says Peter Fellini, a security engineer with Zensar Technologies, an IT and software services firm.
Outsmart us: Instead of a password, try a passphrase. Use letters and characters from a phrase and include special characters, numbers, and upper- and lowercase letters (Mary had a little lamb could become [email protected], for example). Or consider a password manager that generates and remembers random, difficult-to-crack passwords. (Even then, some experts recommend unique passphrases for financial accounts in case the password manager gets hacked.)
3. We sneak while you surf.
A growing number of cyberattacks are arriving via “drive-by download,” says Giovanni Vigna, PhD, a computer science professor at the University of California at Santa Barbara and cofounder of anti-malware provider Lastline Inc. “You visit what looks like a perfectly harmless website,” he says, “but in the background, you are redirected to a series of other sites that send you an attack.” Often even the website’s owner doesn’t know the site has been compromised. Although search engines keep blacklists of known malicious sites, the bad sites are continuously changing.
Outsmart us: Make sure you install all available updates to your browser, or use a browser that automatically updates, like Firefox. Vigna’s research has found that Internet Explorer users are most vulnerable to these attacks.
4. We can infiltrate your baby monitor or smart TV.
Remember, your smart device is essentially a computer—and chances are, it’s not a particularly secure one. Anything in your house that’s connected to the Internet, from your smart fridge to your climate-control system, can be hacked. In several recent incidents, hackers were able to hijack a baby monitor and yell at a baby. Experts have also shown how hackers can turn on a smart TV’s camera and spy on you.
Outsmart us: When setting up smart devices, always change the default password. Most of these devices work from your wireless router, so password protecting your Wi-Fi can also help. Keep up with firmware updates; many devices will inform you when there’s an update available. Otherwise, look for an Update Firmware option in the main menu or settings.
5. We eavesdrop on free public Wi-Fi networks.
Even if you’re connected to a legitimate public network, a “man-in-the-middle” attack can allow hackers to snoop on the session between your computer and the hot spot.
Outsmart us: Avoid public Wi-Fi if possible, especially unsecured networks without passwords, advise security experts at MetLife Defender, a personal data protection program. Instead, set up your smartphone as a secure hot spot or sign up for a VPN (virtual private network) service. If you must use public Wi-Fi, avoid financial transactions and consider using a browser extension like HTTPS Everywhere to encrypt your communications.
6. We lure you with “shocking” videos on Facebook.
A friend just posted a video of an “unbelievable animal found in Africa.” If you click to watch, you’re asked to download a media player or take a survey that will install malware on your computer, says Tyler Reguly, manager of security research at the cybersecurity firm Tripwire. It also shares the video with all your friends.
Outsmart us: Type the video’s title into Google and see if it’s on YouTube. If it’s a scam, someone has probably already reported it.
7. We take advantage of your typos.
Fake sites with slightly altered URLs like micrososft.com or chse.com look surprisingly similar to the real site you meant to visit, but they’re designed to steal your data or install malware on your computer.
Outsmart us: Double-check the site’s address before logging in with your name and password, especially if the home page looks different. Check for https in the address before typing in your credit card information.
8. We crack your password on “easy” sites.
A 2014 study found that about half of us use the same password for multiple websites, making a cybercrook’s job easy. “A hacker will break into a soft target like a hiking forum, get your e-mail address and password, and then go to your e-mail account and try to log in with same password,” says Marc Maiffret, chief technology officer at BeyondTrust, a security and compliance management company. “If that works, they’ll look to see if you have any e-mails from a bank. Then they’ll go to your bank account and try that same password.”
Outsmart us: Use two-factor authentication, a simple feature that requires more than just your username and password for you to log on. In addition to your password, for example, a site may require you to enter a randomly generated code sent to your smartphone to log in. Many companies—including Facebook, Google, Microsoft, Apple, and most major banks—now offer some form of this safeguard. (For a list of companies that offer it, visit twofactorauth.org and click Docs under your provider to learn how to set it up.)
9. We love your Bluetooth headset.
If you leave the Bluetooth function enabled after using a hands-free headset, hackers can easily connect to your phone, manipulate it, and steal your data.
Outsmart us: Always turn Bluetooth off after you use it. Set your visibility to “off” or “not discoverable,” and require a security code when you pair with another Bluetooth device.
10. We can easily break into routers that use WEP encryption.
Many older routers still rely on a type of encryption called WEP (Wired Equivalent Privacy), which can easily be cracked with a widely available software program that anyone can download.
Outsmart us: Make sure your router uses WPA2 (Wi‑Fi Protected Access 2), the most secure type of encryption, or at least WPA. Click your computer’s wireless network icon to check the security type. If your router doesn’t give you one of those choices, call your router manufacturer to see if you need to do a firmware update—otherwise, plan to get a new router. Don’t forget to change your preset Wi-Fi password, since any good hacker knows the default passwords for all major routers.
11. We impersonate trustworthy companies.
You may get a fake financial warning from your bank or credit card company, order confirmation from a retailer, or social networking invitation.
Outsmart us: Remember, most companies never ask you outright for your account information. You can sometimes spot this type of scam by hovering over the address in the From field or by hitting Reply All and looking for misspellings or strange addresses. Also, check to see that the e-mail was sent to you and only you. If you’re not sure it’s legit, call the company instead.
12. We debit tiny amounts—at first.
Cyberthieves may test-drive a stolen card number by running a small charge under $10 to see if anyone notices.
Outsmart us: Check your transactions online regularly—even daily. If you spot a charge you don’t recognize, report it immediately to your card issuer.
13. We hacked that ATM you just withdrew cash from.
Crooks install cleverly disguised “skimmers” to steal your card information, while a hidden camera or a thin skin over the keypad captures your PIN.
Outsmart us: Try to use ATMs inside banks, where it’s tougher for criminals to install these devices, and inspect the machine carefully before you use it. “Whenever I use an ATM, I give the area where you insert the card a little tug to make sure it’s secure and is really a part of the machine,” Fellini says.
14. We count on your downloading our free, fake versions of popular apps.
These apps steal confidential information or bypass your phone’s security settings and subscribe you to premium services. “You choose the free version of a game, it asks for all sorts of access, and you say ‘yes, yes, yes’ to all the permissions,” Vigna says. “The next thing you know, it’s sending premium SMS text messages and stealing your money.”
Outsmart us: Before installing an app, check the ratings and number of people who have installed it—hackers can fake positive ratings, but they can’t stop other posters from warning that the app is a trick. Most fake apps have to be downloaded straight from a website, so make sure you always download from an official market like Google Play or Apple’s App Store.
15. We love that you always leave Wi-Fi on.
Though it’s convenient to leave Wi-Fi turned on while traveling with your laptop, tablet, or smartphone, your device will constantly try to connect to known networks. Attackers can identify those and set up rogue networks that impersonate them.
Outsmart us: Get in the habit of turning off your Wi-Fi every time you leave your home.
16. We fool you with bogus software updates.
You know you’re supposed to update your software to protect it, but hackers may send you fake updates that actually install malicious backdoor programs on your computer.
Outsmart us: If you get a pop-up message about an update, go to the software provider’s actual website and check to see if it’s real. You can also try closing your browser to see if the pop-up disappears—if it does, it may be a fake.
17. We can crack supposedly safe retailers.
Experts say big brands will continue getting hacked until retailers can better protect their data. Hackers sell your information on the black market, and other criminals then use it to make counterfeit cards that can be used for shopping.
Outsmart us: Don’t save your financial information when you shop online—check out as a “guest” when you can. If you fall prey to an attack, ask your bank to issue you a new credit card, take advantage of any credit monitoring that’s offered, and scrutinize your statements.
SAFETY IN REAL LIFE: Readers who recovered from or prevented a cybercrime share their advice
18. Try not to apply for credit cards online. Credit card companies require your Social Security number. Once you put that out there, it’s out there forever. —Christine Mumper, via e-mail
19. Avoid debit cards—they allow hackers much easier access to bank accounts than credit cards do. Also, when logging in to an online account, never check the box that says “Remember me.” It takes only a couple of seconds to type in your username and password each time, and you don’t want that information “remembered.” —Rick Kane, Collettsville, North Carolina
20. Consider freezing your credit with the three credit bureaus and simply thawing your file when you need to open a new account. Keep the passwords you need to thaw the account in a safe place. This is free or inexpensive in most states. —Frank Coulman, via e‑mail
A cybersecurity expert from MetLife Defender helped review and select the best reader tips.