
Below are some habits that could be harmful when using computers.
1. 6 computer habits that might attract hackers' attention
Below are some habits that could be harmful when using computers
Watching pirated movies or TV shows
Nowadays, you can watch movies for free, accepting reduced display quality compared to theater releases or paid services. However, streaming services can be an opportunity for cybercriminals to inject malware into your computer.
This risk increases even more when you decide to download movies instead of watching them online without knowing the source or the entity that uploaded the movie file. To target users, hackers can completely exploit websites that specialize in providing free movies. When you click on enticing ads like 'Click here to watch the latest blockbusters for free,' your computer may become infected with malware.
The best solution to prevent this risk is to be willing to spend a small amount of money each month on reputable streaming services. If you still want to watch movies for free, make sure you have solid information about the source and safety of the websites you visit. You can also use antivirus software to scan files immediately after downloading them, and avoid ads displayed on the movie websites you frequently visit.
Irregular software updates
This is an extremely detrimental mistake that most computer users make today. Not updating means you have to live with new security vulnerabilities that hackers can exploit and attack at any time.

Sharing accounts with others
You may be confident that your computer is equipped with the most advanced security software. But what about your relatives, friends? When they log into shared accounts, are you sure their devices also have antivirus software like yours? Moreover, tech novices are easily deceived by pop-up ads, indirectly exposing information about the shared accounts they use with you.
In other words, the more your account is used on multiple devices, the higher the security vulnerability. Therefore, always keep track of the list of people who can access your account and change passwords periodically or when necessary.
Underestimating USB scanning
With the current development of cloud technology, the role of USB is no longer as crucial as before. However, it is still a 'fire extinguisher' device in emergency situations where there is no network connection. Therefore, it is best to pay attention every time you use a USB, especially those that have been used on multiple devices.
Most of us have the habit of plugging in a USB to the computer and using it immediately without virus scanning. However, viruses and malware especially like to hide in USBs to spread easily across multiple devices. Therefore, if you are not using a completely new USB, you should take some time to scan for viruses before copying any files from the USB to your device.

Using overly simplistic and predictable passwords
If you use passwords that are too simple and easy to guess, they can also create opportunities for hackers to attack and exploit information. Passwords that are too short or too simple can also pose many security risks. According to research, you should set a password with a minimum length of 8 characters to make the hacking process more difficult and time-consuming.
Failure to cover computer microphones and webcams
While not a common method of attack, there have been numerous cases where malicious actors have exploited webcams/cameras and microphones on electronic devices to monitor user activity. Therefore, you should take a small piece of tape to cover the camera and microphone on your computer after use.
You may think that no one has the time to monitor your daily activities and jest, 'They must be leaving me alone'. But it must be affirmed that this is a completely real method of attack and has occurred in many places around the world.
