...
Write
OneWriteup
  • Login
  • Register
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to Protect Yourself from Hackers in 2024: Change These Settings Now!

Deepak Sharma by Deepak Sharma
October 19, 2024
Reading Time: 6 mins read
21
0
how to protect yourself from hackers
Share on FacebookShare on Twitter

Protecting your mobile phones and laptops should be your top priority before using them.

Protect

We rely on mobile devices and laptops daily, but often neglect to properly configure them for maximum security.Setting up a six-digit passcode on your phone and using a simple password for Gmail or social media accounts isn’t enough. Without proper security, your devices can unknowingly get hacked and exploited for cryptomining or data theft. Stolen data and logs are often sold on the Dark Web, leading to severe privacy breaches.

If your data has been leaked via stealer logs or a data breach, you can remove it from the surface web. Want to know more? Click on this link: https://onewriteup.com/remove-leaked-private-photos-or-videos-from-the-internet/

Android Security Settings

1. Enable SIM Pin

–  Go to Settings > Security > SIM Card Lock or Settings > Network & Internet > SIM cards.

2. Encrypt Device

–  Encrypt device storage under Settings > Security > Encryption & credentials.

3. Limit App Permissions

–  Review and restrict app permissions under Settings > Privacy > Permission Manager or Settings > Apps > Restrict Permission for Individual Apps.

4. Disable Access to Notification Tray on Lock Screen

–  Go to Settings > Lock Screen > Notifications and select Do not show notifications or Show when unlocked to block sensitive data from appearing.

5. Disable Smart Lock Features

–  Turn off Smart Lock features like trusted devices and places under Settings > Security > Smart Lock.

6. Turn On Google’s Advanced Protection Program

–  For heightened protection against advanced threats, enable Google’s Advanced Protection Program under Google Account > Security > Advanced Protection Program.

 

iOS (iPhone) Security Settings

1. Limit Lock Screen Access

–  Disable access to Control Center, Wallet, and Notification Center from the lock screen under Settings > Face ID & Passcode.

2. Enable Lockdown Mode

–  Turn on Lockdown Mode for extreme protection against targeted spyware attacks under Settings > Privacy & Security > Lockdown Mode.

3. Disable Notification Previews on Lock Screen

–  Prevent sensitive info from appearing by going to Settings > Notifications > Show Previews and select When Unlocked or Never.

4. Find My iPhone

–  Ensure Find My is enabled under Settings > Your Name > Find My.

5. Turn Off Siri Access from Lock Screen

–  Disable Siri from lock screen under Settings > Siri & Search > Allow Siri When Locked.

6. Limit App Permissions

–  Review app permissions under Settings > Privacy & Security (e.g., location, camera, microphone).

7. Enable Advanced Data Protection for iCloud

–  Turn on end-to-end encryption for iCloud data under Settings > Your Name > iCloud > Advanced Data Protection.

8. Disable Personalized Ads

–  Go to Settings > Privacy & Security > Apple Advertising and disable Personalized Ads.

 

Windows Security Settings

1. Update Windows Regularly

–  Enable automatic updates under Settings > Update & Security > Windows Update.

2. Use BitLocker for Disk Encryption

–  Enable BitLocker under Settings > Update & Security > Device Encryption or Control Panel > BitLocker Drive Encryption.

3. Enable Two-Factor Authentication (2FA)

–  Use 2FA for Microsoft accounts via the Microsoft Authenticator app.

4. Signature Verification (Sigverif)

–  Press Windows + R, type sigverif, and scan for unsigned drivers. Remove or update any flagged drivers.

5. Monitor Active Sessions

–  Open Task Manager (Ctrl + Shift + Esc), go to Users, and log off any unauthorized sessions.

6. Virus & Threat Protection Updates

–  Ensure automatic updates for Windows Defender Antivirus are enabled to receive the latest security definitions: Settings > Update & Security > Windows Security > Virus & Threat Protection > Manage Settings > Check for updates.

Linux Security Settings

1. Update Packages Regularly

–  Schedule automatic updates using a package manager like apt:

>> sudo apt update && sudo apt upgrade

2. Enable Firewall

–  Activate ufw (Uncomplicated Firewall) on Ubuntu or use iptables:

>> sudo ufw enable

3. Disable Root Login

–  Prevent root login by modifying the `/etc/ssh/sshd_config` file:

PermitRootLogin no

4. Install Antivirus

–  Use ClamAV or another antivirus tool:

>> sudo apt install clamav

5. Encrypt Partitions with LUKS

–  Use LUKS for full-disk encryption:

>> sudo cryptsetup luksFormat /dev/sdX

6. Limit App Permissions (AppArmor/SELinux)

–  Use AppArmor or SELinux to limit application permissions.

7. SSH Key Authentication

–  Set up SSH keys for login and disable password-based SSH login by editing `/etc/ssh/sshd_config`:

PasswordAuthentication no

macOS Security Settings

1. Update macOS Regularly

–  Enable automatic updates under System Preferences > Software Update.

2. Use FileVault for Disk Encryption

–  Enable FileVault for full-disk encryption under System Preferences > Security & Privacy > FileVault.

3. Enable Firewall

–  Activate the firewall under System Preferences > Security & Privacy > Firewall.

4. Limit App Permissions

–  Review permissions under System Preferences > Security & Privacy > Privacy.

5. Disable Automatic Login

–  Turn off automatic login under System Preferences > Users & Groups > Login Options.

6. Enable Two-Factor Authentication (2FA)

–  Activate 2FA for your Apple ID under System Preferences > Apple ID > Password & Security.

7. Install Antivirus Software

–  Use antivirus tools like Sophos.

 

Commonly Used Applications Security Settings

1. Web Browsers (Chrome, Firefox, Safari)

–  Enable “Do Not Track” and block third-party cookies for better security: Preferrably you can use Brave browser instead for blocking ads
–  Use HTTPS Everywhere
–  Disable autofill for sensitive data.

2. Messaging Apps (WhatsApp, Instagram, Telegram)

–  Enable 2FA
–  Keep backup codes with yourself at safe place
–  Ensure end-to-end encryption is enabled.
–  Don’t join random bots on telegram

3. Email (Gmail, Outlook)

– Enable 2FA.
– Frequently manage devices which are logged in
– Don’t click on phishing links

4. Cloud Storage (Google Drive, iCloud, Dropbox)

–  Enable 2FA.
–  Encrypt sensitive files before uploading.
– Audit file sharing permissions regularly.

5. Password Managers (LastPass, 1Password)

–  Use a strong master password.
–  Enable 2FA or TOTP
–  Use complex generated passwords for all accounts

Must checkout this article to get yourself familiar with the types of cyber scam going on:  https://www.linkedin.com/pulse/29-ways-get-scammed-cyber-world-deepak-sharma-gpcssi-c7q4c/

Cyber Security starts with  a Cyber Defense: If you can protect yourself you can go save others also…

 

Read More :

ADVERTISEMENT

Have I Been Pwned? Smile you’re under Hacker’s Ruthless Oversight!!!

 

ADVERTISEMENT
Deepak Sharma

Deepak Sharma

Cyber Security Enthusiast sharing my learning in tech. 🧑🏻‍💻

Recently Posted

Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

July 20, 2025
123
HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

November 15, 2024
789
Top 4 Cyber attacks Commonly used for Hacking Websites!

Top 4 Cyber attacks Commonly used for Hacking Websites!

November 9, 2024
172
How to use bloodhound tool for pentesting

How to use Bloodhound / Sharphound for Pentesting Active Directory?

November 6, 2024
576
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Recommended

Golden Ticket Attack

How to perform Golden Ticket Attack in Active Directory in 2024?

October 29, 2024
170
How to Create and Connect Users in Active Directory?

How to Create and Connect Users in Active Directory?

October 6, 2024
200

Popular Story

  • Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    944 shares
    Share 378 Tweet 236
  • Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    22 shares
    Share 9 Tweet 6
  • Termux Top 10 Most Powerful Tools in 2024

    352 shares
    Share 141 Tweet 88
  • How To Create Your Open Source SIEM Home Lab?

    141 shares
    Share 56 Tweet 35
  • 100 Most Asked SOC Analyst Interview Questions For Freshers

    107 shares
    Share 43 Tweet 27
ADVERTISEMENT
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • OneWriteup Labs
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login
  • Sign Up

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.