{"id":3538,"date":"2023-12-27T14:31:58","date_gmt":"2023-12-27T13:31:58","guid":{"rendered":"https:\/\/www.opensight.nl\/blog\/what-is-a-hacker-able-to-see-and-or-do\/"},"modified":"2023-12-27T16:06:37","modified_gmt":"2023-12-27T15:06:37","slug":"what-is-a-hacker-able-to-see-and-or-do","status":"publish","type":"post","link":"https:\/\/www.opensight.nl\/en\/blog\/what-is-a-hacker-able-to-see-and-or-do\/","title":{"rendered":"What is a hacker able to see and\/or do?"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Hackers, cyberattacks, phishing E-mails. These days it seems like half of the news is about cyber attacks. Unfortunately, these types of happenings are indeed on the rise. Since there is still a lot of uncertainty about what exactly a hacker can see or do, we will tell you more in this article.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is a hacker?<\/h3>\n\n\n\n<p>According to the dictionary a hacker is a person who uses computers to get access to data in somebody else&#8217;s computer or phone system (without permission). This means that if you\u2019re able to get into someone\u2019s laptop, you\u2019re a hacker. At OpenSight we think this definition is a little too broad. There\u2019s a significant difference between ethical hacking and hacking with malicious intent. For example, when someone tries to enter a system solely to find vulnerabilities in said system, this is not necessarily a hacker in our definition. We distinguish different types of hackers like Grey hat hackers, White hat hackers, Green hat hackers, Blue hat hackers and Red hat hackers. Every hacker has a different method or hacks with a specific goal in mind. In the previous articles on our website, we explain exactly <a href=\"https:\/\/opensight.nl\/en\/blog\/voorkom-dat-je-slachtoffer-wordt-van-een-van-deze-cybersecurity-risicos-2022\/\">what types of hacking<\/a> there are and how you can <a href=\"https:\/\/opensight.nl\/en\/blog\/5-soorten-cybersecurity-en-waarom-deze-belangrijk-zijn\/\">protect yourself<\/a> against a hacker or cybercriminal.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer d-none d-lg-block\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-12 col-lg-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/wat-kan-een-hacker-zien-of-doen-1024x538.webp\" alt=\"What is a hacker able to see and\/or do?\" class=\"wp-image-2399\" srcset=\"https:\/\/www.opensight.nl\/content\/wat-kan-een-hacker-zien-of-doen-1024x538.webp 1024w, https:\/\/www.opensight.nl\/content\/wat-kan-een-hacker-zien-of-doen-300x158.webp 300w, https:\/\/www.opensight.nl\/content\/wat-kan-een-hacker-zien-of-doen-768x403.webp 768w, https:\/\/www.opensight.nl\/content\/wat-kan-een-hacker-zien-of-doen.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-12 col-lg-6 offset-lg-1\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\">How can I check if I\u2019ve been hacked?<\/h3>\n\n\n\n<p>But how do you know if you\u2019ve been hacked? There are a few signals that show you that you\u2019ve been hacked. Some examples below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Login problems: Suddenly you can\u2019t get into your (social media) accounts, even though you&#8217;re using the right password.<\/li>\n\n\n\n<li>Warnings: A lot of companies send an E-mail if someone tries to log into your account. Aren\u2019t you the one logging in? Then it could be possible someone is trying to break into your account.<\/li>\n\n\n\n<li>Slow electronics: Your laptops or phones are extremely slow.<\/li>\n\n\n\n<li>Pop-up spam: All of a sudden, your screen is filled with pop-ups. This is a form of adware.<\/li>\n\n\n\n<li>Weird chat messages: Your friends and family get weird messages from your account, and you didn\u2019t send them. This is often a case of cybercriminals trying to get money via WhatsApp or other communication platforms.<\/li>\n\n\n\n<li>Encrypted files: Files that were previously open are now suddenly encrypted on your computer. This is a form of ransomware.<\/li>\n<\/ul>\n\n\n\n<p>These are just a few examples of signs that could indicate that you\u2019ve been hacked. There are also countless tools online that can help finding out whether you have been hacked. For example, do you want to know whether your email has been hacked? You can use the website <a href=\"https:\/\/haveibeenpwned.com\/\">\u2018Have I Been Pwned?\u2019<\/a>, and it will check for you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">I\u2019ve been hacked, what do I do?<\/h3>\n\n\n\n<p>Firstly, it&#8217;s important to remain calm. There are a lot of ways to get hacked, but it doesn\u2019t automatically mean you are in danger. It is, however, important to take the right steps to decrease risks. Have you been hacked? First scan your device with a virus scanner, which detects ransomware and other suspicious software for you. Oftentimes a virus scanner will put suspicious files and software in \u2018quarantine\u2019. Deleting the file of the software from your device will be easier this way. In addition, it is important to change all your passwords in the event of a hack. As annoying as it is, this is the best way to keep hackers out and prevent real damage. Next to changing your passwords you should also ensure that software is always up to date. This keeps hackers from casually breaking into your devices. If a work computer or laptop has been hacked, you should always report this to your manager or supervisor and make sure that colleagues are aware. This prevents hackers from gaining access to multiple computers and sensitive data from company systems.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>Should you recognize one of the above signals and suspect that you have been hacked? Make sure you consult an expert! If you haven\u2019t encountered a cyber attack yet, it\u2019s better to be safe than sorry. Always make sure that you protect your valuable data against cybercriminals and ransomware. Want to secure your data professionally and efficiently? <a href=\"https:\/\/opensight.nl\/contact\/\">Contact<\/a> one of our experts!<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2351,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"What is a hacker able to see and\/or do?","_seopress_titles_desc":"Since there is still a lot of uncertainty about what exactly a hacker can see or do, we will tell you more in this article.","_seopress_robots_index":"","footnotes":""},"categories":[45],"tags":[46,50,54],"class_list":["post-3538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current","tag-cyber-security","tag-cybercrime","tag-hacker-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/comments?post=3538"}],"version-history":[{"count":2,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3538\/revisions"}],"predecessor-version":[{"id":3561,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/posts\/3538\/revisions\/3561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media\/2351"}],"wp:attachment":[{"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/media?parent=3538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/categories?post=3538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opensight.nl\/en\/wp-json\/wp\/v2\/tags?post=3538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}