HomeLifestyleTechnology

The tech protecting your private data from cyber attacks

BY James O'Malley

6th Dec 2023 Technology

3 min read

The tech protecting your private data from cyber attacks
The threat from hackers may be constant, but tech companies are racing to meet the challenge and protect your data from different types of cyber attacks
Generally speaking, the single most important thing you can do to keep your computer safe is make sure your operating system and apps are up-to-date.
That annoying box that nags you to install Windows Updates? Unfortunately, it's good advice. Because though it looks like nothing has changed afterwards, below the surface every update—or "patch"—is fixing bugs and holes that can be exploited by hackers.
"It is basically impossible for developers to build a completely secure system"
The problem is that modern computer systems are so wildly complicated that it is basically impossible for developers to build a completely secure system.
However much you test and try, hackers and other people with bad intentions will comb through and look for a bug or a hole they can exploit to rummage around and access your private data.
The good news is that there is fight-back going on. And our operating systems and apps are increasingly wise to some of the most common forms of attack. Here are some of the tricks they’re using to keep you safe.

Fighting different types of cyber attacks

Bruteforce attack

Phone holding phone that shows PIN password screen
The most simple attack is a Bruteforce attack. This is the laborious and time-consuming task of simply going through and trying every single combination of letters and numbers to, for example, guess a password, until you find one that works.
And this is why modern systems have built-in protections against this. It’s why you can only get the passcode on your phone wrong three times before it locks up—to stop someone trying to guess and guess until they get lucky.

Phishing

Phishing isn’t so much clever technology, but is a psychological trick to persuade you to hand over your details.
Most commonly deployed via email or text message, typically you’ll get an email that looks like it is from your bank, Royal Mail, or Facebook or whoever. But if you type in your details as requested, instead of logging you in it will send your details to the hackers instead, so they can login and impersonate you.
And though it is important to remain wise to these sorts of attacks (as they go after our brains—not our computers), email clients are getting better at spotting them. For example, for many scams, Gmail will display a warning that all may not be as it seems.

Man In The Middle

A Man In The Middle attack is when hackers snoop on your data as it transits between you and the place or person it is intended for.
For example, if you browse a website that has http and not https in the address, and you’re on a public wifi, it’s conceivable that anyone on the same network could read every word being sent to your phone or computer.
"If you see the little padlock symbol in the link bar, you can be more confident that the site is safe"
This is why over the last few years, there has been a big move towards websites using “https”—a more secure type of connection that encrypts the data as it moves. So if you see the little padlock symbol in the link bar, you can be more confident that the site is safe.
Messaging apps have been moving over to use more encryption for the same reason.
For example, a normal SMS text message is completely unencrypted—but if you send a message by WhatsApp, only you and your friend will ever see the message. Not even Facebook, the company that owns WhatsApp, will be able to read it.

Malware

Notification of malicious malware file on Windows laptop screen
Finally there is the holy grail for hackers: Malware. This is software written to meddle with your computer.
If hackers can run their own code on your computer, then they can do, well, whatever they like—from block access to your files until you pay them money (what is known as ransomware), to snoop around and steal any files that look interesting.
Or maybe they’ll just delete everything to cause chaos.
"If hackers can run their own code on your computer, then they can do, well, whatever they like"
This used to be a really, really bad problem. For example, in the Windows 95 era, it used to be possible to download an app from anywhere on the web, click on it, and run it on your computer—with no one checking what it does or whether it is legit.
But today, both Windows and Mac are more locked down than they used to be. Though you can still download apps from anywhere, typically both will throw up a scary warning if the operating systems think a file looks suspicious.
Similarly, both will attempt to keep your personal files separated off, and will ask permission if an app wants to delve into them. And due to the way they are designed, your phone (especially if you have an iPhone) is probably even more locked down.

Staying vigilant

So though the threat of hackers is real and scary, the good news is that the good guys are getting better at fighting them. But that doesn’t mean we should be complacent.
The best way to keep your data safe is to remain vigilant, and be careful where you click. And, of course, to make sure all of your apps are up-to-date, so they have all of the latest safeguards to keep you safe.
Keep up with the top stories from Reader's Digest by subscribing to our weekly newsletter

This post contains affiliate links, so we may earn a small commission when you make a purchase through links on our site at no additional cost to you. Read our disclaimer

Loading up next...