Write
OneWriteup
  • Login
  • Register
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to Protect Yourself from Hackers in 2024: Change These Settings Now!

Deepak Sharma by Deepak Sharma
October 19, 2024
Reading Time: 6 mins read
21
0
how to protect yourself from hackers
Share on FacebookShare on Twitter

Protecting your mobile phones and laptops should be your top priority before using them.

Protect

We rely on mobile devices and laptops daily, but often neglect to properly configure them for maximum security.Setting up a six-digit passcode on your phone and using a simple password for Gmail or social media accounts isn’t enough. Without proper security, your devices can unknowingly get hacked and exploited for cryptomining or data theft. Stolen data and logs are often sold on the Dark Web, leading to severe privacy breaches.

If your data has been leaked via stealer logs or a data breach, you can remove it from the surface web. Want to know more? Click on this link: https://onewriteup.com/remove-leaked-private-photos-or-videos-from-the-internet/

Android Security Settings

1. Enable SIM Pin

–  Go to Settings > Security > SIM Card Lock or Settings > Network & Internet > SIM cards.

2. Encrypt Device

–  Encrypt device storage under Settings > Security > Encryption & credentials.

3. Limit App Permissions

–  Review and restrict app permissions under Settings > Privacy > Permission Manager or Settings > Apps > Restrict Permission for Individual Apps.

4. Disable Access to Notification Tray on Lock Screen

–  Go to Settings > Lock Screen > Notifications and select Do not show notifications or Show when unlocked to block sensitive data from appearing.

5. Disable Smart Lock Features

–  Turn off Smart Lock features like trusted devices and places under Settings > Security > Smart Lock.

6. Turn On Google’s Advanced Protection Program

–  For heightened protection against advanced threats, enable Google’s Advanced Protection Program under Google Account > Security > Advanced Protection Program.

 

iOS (iPhone) Security Settings

1. Limit Lock Screen Access

–  Disable access to Control Center, Wallet, and Notification Center from the lock screen under Settings > Face ID & Passcode.

2. Enable Lockdown Mode

–  Turn on Lockdown Mode for extreme protection against targeted spyware attacks under Settings > Privacy & Security > Lockdown Mode.

3. Disable Notification Previews on Lock Screen

–  Prevent sensitive info from appearing by going to Settings > Notifications > Show Previews and select When Unlocked or Never.

4. Find My iPhone

–  Ensure Find My is enabled under Settings > Your Name > Find My.

5. Turn Off Siri Access from Lock Screen

–  Disable Siri from lock screen under Settings > Siri & Search > Allow Siri When Locked.

6. Limit App Permissions

–  Review app permissions under Settings > Privacy & Security (e.g., location, camera, microphone).

7. Enable Advanced Data Protection for iCloud

–  Turn on end-to-end encryption for iCloud data under Settings > Your Name > iCloud > Advanced Data Protection.

8. Disable Personalized Ads

–  Go to Settings > Privacy & Security > Apple Advertising and disable Personalized Ads.

 

Windows Security Settings

1. Update Windows Regularly

–  Enable automatic updates under Settings > Update & Security > Windows Update.

2. Use BitLocker for Disk Encryption

–  Enable BitLocker under Settings > Update & Security > Device Encryption or Control Panel > BitLocker Drive Encryption.

3. Enable Two-Factor Authentication (2FA)

–  Use 2FA for Microsoft accounts via the Microsoft Authenticator app.

4. Signature Verification (Sigverif)

–  Press Windows + R, type sigverif, and scan for unsigned drivers. Remove or update any flagged drivers.

5. Monitor Active Sessions

–  Open Task Manager (Ctrl + Shift + Esc), go to Users, and log off any unauthorized sessions.

6. Virus & Threat Protection Updates

–  Ensure automatic updates for Windows Defender Antivirus are enabled to receive the latest security definitions: Settings > Update & Security > Windows Security > Virus & Threat Protection > Manage Settings > Check for updates.

Linux Security Settings

1. Update Packages Regularly

–  Schedule automatic updates using a package manager like apt:

>> sudo apt update && sudo apt upgrade

2. Enable Firewall

–  Activate ufw (Uncomplicated Firewall) on Ubuntu or use iptables:

>> sudo ufw enable

3. Disable Root Login

–  Prevent root login by modifying the `/etc/ssh/sshd_config` file:

PermitRootLogin no

4. Install Antivirus

–  Use ClamAV or another antivirus tool:

>> sudo apt install clamav

5. Encrypt Partitions with LUKS

–  Use LUKS for full-disk encryption:

>> sudo cryptsetup luksFormat /dev/sdX

6. Limit App Permissions (AppArmor/SELinux)

–  Use AppArmor or SELinux to limit application permissions.

7. SSH Key Authentication

–  Set up SSH keys for login and disable password-based SSH login by editing `/etc/ssh/sshd_config`:

PasswordAuthentication no

macOS Security Settings

1. Update macOS Regularly

–  Enable automatic updates under System Preferences > Software Update.

2. Use FileVault for Disk Encryption

–  Enable FileVault for full-disk encryption under System Preferences > Security & Privacy > FileVault.

3. Enable Firewall

–  Activate the firewall under System Preferences > Security & Privacy > Firewall.

4. Limit App Permissions

–  Review permissions under System Preferences > Security & Privacy > Privacy.

5. Disable Automatic Login

–  Turn off automatic login under System Preferences > Users & Groups > Login Options.

6. Enable Two-Factor Authentication (2FA)

–  Activate 2FA for your Apple ID under System Preferences > Apple ID > Password & Security.

7. Install Antivirus Software

–  Use antivirus tools like Sophos.

 

Commonly Used Applications Security Settings

1. Web Browsers (Chrome, Firefox, Safari)

–  Enable “Do Not Track” and block third-party cookies for better security: Preferrably you can use Brave browser instead for blocking ads
–  Use HTTPS Everywhere
–  Disable autofill for sensitive data.

2. Messaging Apps (WhatsApp, Instagram, Telegram)

–  Enable 2FA
–  Keep backup codes with yourself at safe place
–  Ensure end-to-end encryption is enabled.
–  Don’t join random bots on telegram

3. Email (Gmail, Outlook)

– Enable 2FA.
– Frequently manage devices which are logged in
– Don’t click on phishing links

4. Cloud Storage (Google Drive, iCloud, Dropbox)

–  Enable 2FA.
–  Encrypt sensitive files before uploading.
– Audit file sharing permissions regularly.

5. Password Managers (LastPass, 1Password)

–  Use a strong master password.
–  Enable 2FA or TOTP
–  Use complex generated passwords for all accounts

Must checkout this article to get yourself familiar with the types of cyber scam going on:  https://www.linkedin.com/pulse/29-ways-get-scammed-cyber-world-deepak-sharma-gpcssi-c7q4c/

Cyber Security starts with  a Cyber Defense: If you can protect yourself you can go save others also…

 

ADVERTISEMENT

Read More :

Have I Been Pwned? Smile you’re under Hacker’s Ruthless Oversight!!!

 

ADVERTISEMENT
Deepak Sharma

Deepak Sharma

Cyber Security Enthusiast sharing my learning in tech. 🧑🏻‍💻

Recently Posted

HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

November 15, 2024
707
Top 4 Cyber attacks Commonly used for Hacking Websites!

Top 4 Cyber attacks Commonly used for Hacking Websites!

November 9, 2024
165
How to use bloodhound tool for pentesting

How to use Bloodhound / Sharphound for Pentesting Active Directory?

November 6, 2024
472
Pass The Hash

How to perform Pass The Hash Attack on Active Directory in 2024?

November 2, 2024
147
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Recommended

Top 4 Cyber attacks Commonly used for Hacking Websites!

Top 4 Cyber attacks Commonly used for Hacking Websites!

November 9, 2024
165
Top 5 Unique Methods for Bug Bounty Hunters

Top 5 Unique Methods for Bug Bounty Hunters 300 IQ Findings.

September 22, 2024
236

Popular Story

  • Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    756 shares
    Share 302 Tweet 189
  • Termux Top 10 Most Powerful Tools in 2024

    282 shares
    Share 113 Tweet 71
  • 100 Most Asked SOC Analyst Interview Questions For Freshers

    93 shares
    Share 37 Tweet 23
  • How to use Bloodhound / Sharphound for Pentesting Active Directory?

    85 shares
    Share 34 Tweet 21
  • How To Create Mod Games And Hacks Using DLL Injection?

    34 shares
    Share 14 Tweet 9
ADVERTISEMENT
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • OneWriteup Labs
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login
  • Sign Up

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In