Categories
Noticias Seguridad

how can they use them to attack

Data they can collect on the Internet

As we have mentioned, when surfing the net, when registering on sites, making purchases or using different services, we can leave a lot personal information. Here we can include our name and surname, email address, telephone number and even the purchase details of the bank card.

By registering on an online platform we are trusting that that site is legitimate and will not use that information for bad purposes. For example, when we enter a web page to make a purchase, the normal thing is that we put at least our e-mail, home address, name and surname, as well as the telephone number.

In case that site is attacked or there is some kind of filtration, all that data could end up in the wrong hands or end up being public on the network. We have seen numerous such cases. But one of the most common problems is that we forget a social network or a forum in which we registered years ago. That service may have been forgotten, that it is no longer used by users, but our data is still there.

Keep in mind that our personal information has great value on the net. It can be used for different techniques that hackers use, as we will see. Hence, it is very important to avoid leaving a trace and control the information that we make public.

What can they do with our personal data

If a hacker manages to get hold of our personal data on the Internet, they could have a wide range of possibilities to use it and profit from it. An example is the fact of being able to include ourselves in spam campaigns. At the end of the day they could know our email address, name and even phone number. They can also have information about our tastes, since they will obtain data from pages we have visited, stores where we have bought, etc.

Another very important question is that all this could be used to launch custom phishing attacks. This is important, as the probability of success is greatly increased. That is, it is not the same as a hypothetical victim receiving a generic email to log into a site and that it is actually a trap, to a more personalized email, with our name and even with a platform that we use as bait. They could be significantly more likely to succeed.

They could even reach impersonate our identity. This is dangerous since they could create profiles on social networks with our data, add friends or relatives who would not suspect anything and, in this way, attack them as well. For example, they could do this if they send messages through social networks that contain malware or malicious links. That is why it is always important to detect bots on social networks.

Therefore, as we have seen, it is very important to prevent our personal data from remaining on the network on platforms that we stop using. You always have to protect the information and not take risks of any kind. Otherwise we could be victims of multiple cyber attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *