10 Traits of Great PMs

PMs have diverse backgrounds, murky responsibilities, and wildly varied expectations across companies. It’s nearly impossible to define what makes a PM great. With those caveats, here is an attempt…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




How Hackers Can Permanently Lock You out of Your Accounts

Some hackers use malicious code, but most just hide in plain sight. It can be devastatingly effective.

By Dylan Curran

When their computer or social media account is hijacked by an unknown entity, most people probably picture something like this: a faceless man hunched over a sleek laptop in an abandoned building, eyes darting to and fro, hands dancing across a mechanical keyboard. Green ciphers wash down his screen faster than the eye can track until … ping! your face pops up on the screen. He just cracked your Facebook account, and now this digital mastermind is going to message all your friends asking for money. Jackpot.

This only happens in movies, of course, and while a minority of “hackers” do write Trojan horses, viruses and other malicious code, most just hide in plain sight and exploit human psychology to gain entrance. Social engineering can take many forms, including “tailgating” — following someone through a turnstile or into an elevator to access restricted floors; showing up at a restricted site disguised as an IT contractor; or the infamous SIM-swapping hack in which the hacker simply calls T-Mobile’s customer service, pretends to be you, perhaps gives your home address or SSN, and asks to port your number to a new SIM card, bypassing any two-factor authentication you have. This isn’t particularly difficult; the data needed to pretend to be you can be easily gleaned from the hundreds of data breaches that occur every year. Most often, hackers enter through the front door.

A young woman recently contacted me for help: a hacker gained access to her Instagram and Snapchat and started sending her friends “nudes” she had taken. She tried many times to regain access to her account — often arduous efforts requiring she send social media companies selfies with dates and codes — but every time she regained access, the intruder locked her out again and forced her to start from scratch.

When I heard her story I was surprised; in these cases a password reset is usually sufficient. After digging a bit deeper I was astounded by the brutal effectiveness of the hacker’s strategy — so complete it left his victim with no recourse to regain her accounts.

Add a comment

Related posts:

Jab Imtiaz Wrote JHMS

After films like Love Aaj Kal, Tamasha or Jab We Met, Imtiaz Ali should ideally have improved in his story telling. Neither did that happen nor did he get a good scriptwriter. The film takes you…

An Indie Authors Journey

In episode 315 of the #AskGaryVee show, Gary says something he has said multiple times before. He said he has zero expectations of anyone. He says he has never been let down because he never gave…

Mood Change

Pale and clouded sun. “Mood Change” is published by RZJ in birds & rivers.