“Human Stupidity, that’s why hackers win.”
Med Amine Khelifi

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purposes. This type of cyber attack is common among social media accounts and platforms requiring personal accounts over networks.

Ethical Hacking – Hacker Types
- White Hat Hackers – White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
- Black Hat Hackers – Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- Grey Hat Hackers – Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
5 easy ways to avoid being hacked online
By Donna Freydkin
- Keep changing your password and updating your accounts.
- You can check to see if you’ve been part of a data breach by using a site like this one.
- Don’t use the same email address that you use for watching movies as you do for your investments or your banking activities. Keep them very separate to create silos that can help protect personal data.
- Be leery of those personality tests you see online because they can ask too much personal information that can be used against you.
- When creating your online profile, don’t reveal the real street you grew up on, or your mother’s maiden name. Use the information of a person you know, or make up the answer with a response you will remember.
Things to Do Right Now if You’ve Been Hacked
- Change Your Passcode
- Use a Passcode Manager
- Turn on Two-factor Authentication
- Tell your Friends
- Delete Any Sensitive Data from The Hacked Account
- De-Authorize Apps on Facebook, Twitter, Google, etc
- Check your Bank Statements
- Scan your Mac