IT pros share some crucial lessons on how to avoid getting hacked.
True
Mozilla

In 2009, Scott McGready stumbled on a massive phishing scam targeting his company's email server.

Thousands of emails bombarded the company in a short period of time. They all came from the same source, pretending to be someone or something they weren't in order to lure people into clicking on shady links and giving up their personal data.

"While investigating it, I stumbled upon the phisher's database which had [the] personal data of thousands of people," McGready says. "I was surprised how little effort was required on the fraudster's part to acquire such a trove of information."


This discovery sparked McGready's interest in information security and teaching others how to protect themselves from fraud. Since then, this journey has taken him from the U.K.'s National Trading Standards department to the documentary series "Secrets of the Scammers" to his own company and beyond.

Here are just a few lessons from McGready — and some other IT professionals — about securing your personal data:

Photo by Stomchak/Wikimedia Commons.

1. Know there is a LOT of data about you online.

"Having data readily available online means that things like phishing emails can be automatically tailored to targets without much effort," McGready says.

But what does "data" really mean in this case? Um. Er. Pretty much everything. Even if we don't realize it. Something as simple as your basic browsing habits and location history can actually reveal a lot about you. Even if your name's not attached to it, a savvy social hacker could still figure something out.

2. Be aware that your friends may expose info about you — even if you're not on social media.

"We tend to share every detail of our lives on social media because we feel obliged to by peer pressure — whether that be adding your birthday to your Facebook profile because the website keeps asking for it," McGready says. But it's worse when your friend tags you in that photo from high school with your school mascot in the background and — oops. There goes another security question.

Photo by PhilAndPam/Flickr.

3. Pay attention so you can mitigate the risks (though probably not completely avoid them).

McGready recommends keeping your social media profiles as private as possible and asking your friends and family to do the same. "Even those that intentionally aren't on social media may be easily findable by their friends or family that share the 'dinner table selfie.'"

4. It's better to be proactive than wait until you're compromised.

"We hear about data leaks almost every week, it seems," McGready says. "The general public are no longer asking 'if' their data is compromised, but rather 'when.'"

This might sound scary. But it's also a good reminder to stay sharp.

Image via Petr Kratochvil/publicdomainpictures.

5. Check the Facebook apps and third-party services that might have access to your account.

"It's worth checking what data you share with specific companies and only giving out the bare minimum in case of a data breach in the future," McGready explains.

For example: Does Bejeweled Blitz really need permission to access everything you've ever put on Facebook, to post on your behalf, and to spam your friends and family? It's not just annoying — it puts you at risk if that information leaks.

6. Take some time to get rid of those old accounts.

A clever hacker might still be able to figure out something through your iwasdefinitelyacool15yearold@aol.com email address. "Many of us, myself included, also have a large number of 'dormant accounts' on websites that we no longer use," McGready says. "I'd fully recommend logging into these accounts and changing all the profile information before deleting the account."

Change those old accounts! Photo from Daderot/Wikimedia Commons.

7. Don't feel bad if it happens to you. Even IT professionals fall for it!

Georgia Bullen, technology projects director for New America's Open Technology Institute, recounts how she was hacked:

"My password wasn't secure enough and so someone had built a program that was logging into not-secure-enough accounts and then spamming."

What she felt at the time is all too familiar for anyone who's been hacked: "Embarrassed, confused, and then really worried that someone else was going to click on something from me."

8. Be smart, pay attention, and know what you're getting into with any website or service you sign up for.

This bears repeating because a little awareness can make a big difference.

Photo by Marcello Casal Jr/ABr/Wikimedia Commons.

9. Have a solid P@$$w0rds plan.

Passwords are the Achilles' heel of the modern world — but there's a trick.

"It's totally possible [for hackers] to take one password, see where you've re-used it, and then get access to those accounts as well. And that's where the bigger danger happens," explains Harlo Holmes from the Freedom of the Press Foundation.

That's why, in general, passwords should be different for every website or service used, and consist of three random words, interspersed with special characters; a DiceWare password like "correct horse battery staple" is a good place to start.

Password managers can help out by creating unique passwords for you. Which leads to...

10. Use a password manager.

Password managers can generate strong, random passwords for you. And they keep track of all of your different passwords so you don't need to memorize them yourself.

All you need to do is remember one super-secure master password in order to unlock every other possible password combination. That way, says Bullen, you  can't even make the mistake of verbally giving your password away because you genuinely don't know it yourself! (Unless it's your master password, in which case, ya know, don't do that.)

Photo by Aussie Legend/Wikimedia Commons.

11. Set up two-factor authentication (2FA) for added security.

Safety is good, but a back-up plan is even better. 2FA sends a code to a device on your person just to make sure that the person logging in is really you. Even if your password does get compromised, the hacker probably doesn't have access to your smartphone, too. (Probably.)

Mozilla's Amira Dhalla explains how it works:

12. Consider using a separate email address — with a separate strong password — for important accounts like banking.

That way, even if you do use the same password elsewhere, hackers will have a harder time getting in to your important accounts. (Make sure this secondary email account has two-factor authentication, too!)

13. Be sure to hover over links before you click them.

"Links may look legitimate, but upon hovering, they actually redirect to a completely different place," McGready says. (Don't believe me? See what happens when you click on www.upworthy.com/definitely-not-an-upworthy-page.)

14. Always double-check the URL in the address bar. (But even that's not always safe.)

Ever notice that green padlock in your browser bar? It's a good sign! ... except when it's not. As McGready explains, "While it's true that this means your data is encrypted between your computer and the website itself, it doesn't legitimize the website."

Photo by Intel Free Press/Flickr.

15. Secure your router.

It may seem harmless to use the default password for your router, but that can actually leave you vulnerable to hackers (there are even websites that can be used to find out different routers' default settings). And someone accessing your router can access pretty much your entire home network. So it's worth taking that small extra step of setting up a strong user name and password.

16. Be wary: These days, the internet is in everything from lightbulbs to baby diapers. Which is super cool! And bad.

McGready sees "the internet of things," or IoT, as the biggest online threat on the horizon. Even if you have worried about Amazon spying on you, you probably didn't consider who else could be spying on you through a vulnerable Wi-Fi or Bluetooth system built into your smart home. "The issue comes when these wireless chips are integrated by default on all products, whether the customer wants them or not," McGready explains.

Photo by Horst JENS/Flickr.

17. Exercise a little extra caution.

It all boils down to the fact that humans are too trusting.

We trust that our friends aren't going to expose our address over Twitter. We trust that some disgruntled Angry Birds employee won't hijack our linked Facebook page because we didn't pay attention to permissions. We trust the green padlock in the browser bar that keeps our credit cards secure, even if the website taking that information wants to use it for a shady purpose.

Simply put, we trust that the internet is mostly good and that people are, too.

But it doesn't hurt to double-check. For more on how to stay safe on the internet, check out these videos from Mozilla.

U.S. Air Force photo illustration/Airman 1st Class Devin Boyer.

It's hard to solve a problem you can't see — which is why McGready is so passionate about teaching online safety.

"Show the public exactly what is possible and what they should be watching out for," McGready says. "It's one thing to tell someone that a scammer can send a text which appears to be from a legitimate company or a known person; it's another thing entirely to send a text to that person's phone which comes from 'Mum.'"

There's no "one weird trick" to protect us from the dangers of technology. But we can do our due diligence — as long as we know where to start.

Update 6/23/2017: The video was updated.

True

In 1945, the world had just endured the bloodiest war in history. World leaders were determined to not repeat the mistakes of the past. They wanted to build a better future, one free from the "scourge of war" so they signed the UN Charter — creating a global organization of nations that could deter and repel aggressors, mediate conflicts and broker armistices, and ensure collective progress.

Over the following 75 years, the UN played an essential role in preventing, mitigating or resolving conflicts all over the world. It faced new challenges and new threats — including the spread of nuclear weapons and other weapons of mass destruction, a Cold War and brutal civil wars, transnational terrorism and genocides. Today, the UN faces new tensions: shifting and more hostile geopolitics, digital weaponization, a global pandemic, and more.

This slideshow shows how the UN has worked to build peace and security around the world:

1 / 12

Malians wait in line at a free clinic run by the UN Multidimensional Integrated Mission in Mali in 2014. Over their 75 year history, UN peacekeepers have deployed around the world in military and nonmilitary roles as they work towards human security and peace. Here's a look back at their history.

Photo credit: UN Photo/Marco Dormino

Biases, stereotypes, prejudices—these byproducts of the human brain's natural tendency to generalize and categorize have been a root cause of most of humanity's problems for, well, pretty much ever. None of us is immune to those tendencies, and since they can easily slip in unnoticed, we all have to be aware of where, when, and how they impact our own beliefs and actions.

It also helps when someone upends a stereotype by saying or doing something unexpected.

Fair or not, certain parts of the U.S. are associated with certain cultural assumptions, perhaps none more pinholed than the rural south. When we hear Appalachia, a certain stereotype probably pops up in our minds—probably white, probably not well educated, probably racist. Even if there is some basis to a stereotype, we must always remember that human beings can never be painted with such broad strokes.

Enter Tyler Childers, a rising country music star whose old-school country fiddling has endeared him to a broad audience, but his new album may have a different kind of reach. "Long Violent History" was released Friday, along with a video message to his white rural fans explaining the culminating track by the same name. Watch it here:

Keep Reading Show less
True
Back Market

Between the new normal that is working from home and e-learning for students of all ages, having functional electronic devices is extremely important. But that doesn't mean needing to run out and buy the latest and greatest model. In fact, this cycle of constantly upgrading our devices to keep up with the newest technology is an incredibly dangerous habit.

The amount of e-waste we produce each year is growing at an increasing rate, and the improper treatment and disposal of this waste is harmful to both human health and the planet.

So what's the solution? While no one expects you to stop purchasing new phones, laptops, and other devices, what you can do is consider where you're purchasing them from and how often in order to help improve the planet for future generations.

Keep Reading Show less

The legality of abortion is one of the most polarized debates in America—but it doesn’t have to be.

People have big feelings about abortion, which is understandable. On one hand, you have people who feel that abortion is a fundamental women’s rights issue, that our bodily autonomy is not something you can legislate, and that those who oppose abortion rights are trying to control women through oppressive legislation. On the other, you have folks who believe that a fetus is a human individual first and foremost, that no one has the right to terminate a human life, and that those who support abortion rights are heartless murderers.

Then there are those of us in the messy middle. Those who believe that life begins at conception, that abortion isn’t something we’d choose—and we’d hope others wouldn’t choose—under most circumstances, yet who choose to vote to keep abortion legal.

Keep Reading Show less
@frajds / Twitter

Father Alek Schrenk is known as one of the "9 Priests You Need to Follow on Twitter." He proved his social media skills Sunday night after finding a creepy note on a parked car and weaving a lurid Twitter tale that kept his followers on the edge of their pews.

Father Schrenk was making his nightly walk of the church grounds to make sure everything was fine before retiring to the rectory, when he found a car parked by itself in front of the school.

Curious, he looked inside the car and saw a note that made his "blood run cold" attached to the steering wheel. "Look in trunk!" the note read. What made it extra creepy was that the two Os in "look" had smiley faces.

Keep Reading Show less