Skip Navigation Links
13 Jul 2023  (2875 Views) 
[x]
Out of the box


How to deal with hackers
After some research, I understand that the hacker work in this way.

a) The hacker create a malware and tricked the victim into downloading the malware into the phone.

b) The malware is able to trace the keystrokes or screen shots on the mobile phone and send the data quickly to a command and control server (C&C) that is accessible to the hacker.

c) The hacker can get the login credentials (i.e. ID and password) in this way.

d) The hacker logs into the bank account using the login credentials. If the bank sends an OTP by SMS or email to the victim's phone, the hacker can see the OTP and use it to enter the bank account. From there, the hacker can withdraw money, make changes, etc.

e) If the victim uses a 2FA on the phone that requires a fingerprint to activate, the hacker will be blocked.

f) It is better to use a digital token, rather than a OTP sent to the phone.

g) If the app is downloaded from Play Store (Android) or App Store (IOS), the malware will be detected and stopped.

h) If the user runs anti virus software, they are able to detect some (but not all) the malware.

I used a digital token (fingerprint controlled) for my bank accounts. For the other accounts, I mostly use a digital token (not fingerprint controlled). This is not very secure, but the other websites are not important, i.e. they do not contain money.

I am not worried about hackers and scammers. I know how they operate, and I can take precautions against them. If they break into my website accounts, I am not worried because they are not stealing any money.

Tan Kin Lian


Add Comment

I use 2 phones. One with my online banking using wifi and the otp is sent to my other phone.

Roger  01 Aug 2023  

Add a comment

Email
Comment


QR Code