Hacking Humans is Painfully Easy
Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh.
Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of convincing someone to click on a fake link, and then gathering information, the hackers were able to use this info to get into other accounts, and eventually hacked things such as her power of attorney form, Social Security information and learned how to open her garage door and her home.
How did they do this? Mrs. Walsh used the same password for all accounts and did not use recommended security measures.
Fortunately, Mrs. Walsh’s life wasn’t ruined. Instead, this hacking was set up by the New York Times and a private company made up of “ethical hackers”, yes there is such a thing, to show just how easy it is to gain access to someone’s digital life.
Computers Are Gold Mines of Important Information
When the team of ethical hackers gained access to Mrs. Walsh’s computer, they found a number of malicious programs running in the background. Examples include InstallBrain, a program that will download programs on demand, and programs such as SlimCleaner, SearchProtect and FunWebProducts, which can spy on Internet searches, change home pages and gather information through click baiting. More than likely she downloaded some lame tool bar that added all this bloatware. Keep in mind, Mrs. Walsh was only visiting sites such as Google and Facebook, sites that most of us visit several times a day.
Stopping the Hackers in Their Tracks
We can all learn lessons from Mrs. Walsh’s experience. Here are some things that she could have done to avoid this from occurring, and things you should do to remain safe:
- Use a password manager to keep track of long or complicated passwords, and use a different password for every account.
- Use a two-step authentication service, one that asks for a second password when an unrecognizable machine attempts to access an account.
- Use automatic updates for services such as browser updates or operating system updates.
- Wipe the computer clean if necessary, then start employing these new practices.
- Stop downloading stupid useless tool bars that are often delivery methods for crappy software.
- Pay attention to what you are downloading and why. Even when you are updating software, look for any checked boxes that install bloatware.
Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing identity theft prevention.

This hack is more serious than you think. Drivers and passengers should be aware that “flawed” and compromised vehicles can suddenly be overtaken remotely, forced into shutting down the engine in the middle of a highway or drive the car into other cars. And it’s not just cars, but 18-wheelers and busloads of people.
And their bite is as big as their bark, as this announcement came soon after several major banks around the world were struck—and Anonymous proudly claimed credit. The banks that were apparently breached by Anonymous include:
Nevertheless, effective record keeping for these hacking incidents doesn’t exist. For instance, search warrants that permit hacking are issued using elusive language, and this makes it difficult to keep track of when the feds hack.
1. Use Plugins
When ransomware infects your computer, it holds your files hostage; you can’t access them—until you pay the hacker (usually in bitcoins). Once paid, the crook will give you a decryption “key.” Sometimes the fee will go up if you don’t pay by a deadline. Fees may a few to hundred to several hundred dollars to way more for big businesses.
The “Dark Web” is the go-to place for hackers looking for guidance and tools like malware. Yes, you can buy malware. If you don’t want to be the hacker, you can hire a hacker.
Customers go to the Learning Lodge store and download content to their children’s VTech devices. The devices for downloading to are a tablet, watch and action camera.

























