Skip to content
Sunday, April 26, 2026
MALIKA KAROUM NEW FUTURE

MALIKA KAROUM NEW FUTURE

– THE NEW WEB 3.0 FUTURE –

  • Home
  • Definitions of Metaverse
  • Malika Karoum: Artificial Intelligence
  • Malika Karoum: ChatGPT
  • Malika Karoum Metaverse
    • Metaverse Digital Virtual Environment
    • A FUTURE METAVERSE
    • METAVERSE -THE NEW FUTURE-
    • Art – The Next Generation
    • The New Web 3.0
    • Metaverse project
    • What are Non Fungible Tokens (NFT-tokens)?
    • What are NFTs?
  • Malika Karoum Media

5 Methods Hackers Use to Break Into Your Bank Account

Malika Karoum Online News
February 26, 2019February 26, 2019Malika Karoum Dubai
hackers-bank-account

With so many users making the jump to internet banking, it’s no wonder that hackers are on the hunt for login details. What may be surprising, however, are the lengths that hackers go to in order to access your finances.

Here’s a look at how hackers target your bank account and how to stay safe.

1. Mobile Banking Trojans

These days, you can manage all of your finances from your smartphone. Usually, a bank will supply an official app from which you can log in and check your account. While convenient, this has become a key attack vector for malware authors.

Fake Apps

The simpler means of attack is by spoofing an existing banking app. A malware author creates a perfect replica of a bank’s app and uploads it to shady third-party sites. Once you’ve downloaded the bad app, you enter your username and password into it, which is then sent to the hacker.

App Hijacking

The sneakier version of this is the mobile banking Trojan. These aren’t disguised as a bank’s official app; they’re usually a completely unrelated app with a Trojan installed within. When you install this app, the Trojan begins to scan your phone for banking apps.

When it detects a banking app being launched, the malware quickly puts up a window that looks identical to the app you just booted up. If this is done smoothly enough, the user won’t notice the swap and will enter their details into the fake login page. These details are then uploaded to the malware author.

Typically, these Trojans also need an SMS verification code to complete the hack. To do this, they’ll often ask for SMS read privileges during install, so they can steal the codes as they come in.

How to Defend Yourself

When downloading apps from the app store, keep an eye on the amount of downloads it has. If it has a very low amount of downloads and little to no reviews, it’s too early to call if it has malware or not.

This goes double if you see an “official app” for a very popular bank with a small download count—it’s likely an imposter! If you’re interested in learning more, be sure to read our guide on how to avoid Trojans.

Likewise, be careful with what permissions you give apps. If a mobile game asks you for SMS read permissions with no explanation as to why it wants them, stay safe and don’t allow the app to install. Never install apps from third-party sites, as they’re more likely to contain malware.

2. Phishing

As the public becomes savvy toward phishing tactics, hackers have escalated their efforts to trick people into clicking their links. One of their nastiest tricks is hacking the email accounts of solicitors and sending phishing emails from a previously-trusted address.

What makes this hack so devastating is how hard it would be to spot the scam. The email address would be legitimate, and the hacker could even to talk to you on a first-name basis. This is exactly how an unfortunate home buyer lost £67,000, despite replying to an email address that was previously legitimate.

How to Defend Yourself

Obviously, if an email address looks suspicious, treat its contents with a healthy dose of skepticism. If the address looks legitimate but something “seems off,” see if you can validate the email with the person sending it—preferably not over email, in case the hackers have compromised the account!

3. Keyloggers

This method of attack is one of the quieter ways a hacker can gain access to your bank account. Keyloggers are a type of malware that records what you’re typing and sends the information back to the hacker.

That might sound inconspicuous at first, but imagine what would happen if you typed in your bank’s web address, followed by your username and password. The hacker would have all the information they need to break into your account!

How to Defend Yourself

Install a stellar antivirus and make sure it checks your system every so often. A good antivirus will sniff out a keylogger and erase it before it can do damage.

If your bank supports two-factor authentication, be sure to enable this. This makes a keylogger far less effective, as the hacker won’t be able to replicate the authentication code even if they get your login details.

4. Man-in-the-Middle Attacks

Sometimes, a hacker will target the communications between you and your bank’s website in order to get your details. These attacks are called Man-in-the-Middle (MITM) attacks, and the name says it all; it’s when a hacker intercepts communications between you and a legitimate service.

Usually, an MITM attack involves monitoring an insecure server and analyzing the data that passes through. When you send your login details over this network, the hackers “sniff out” your details and steal them.

Sometimes, however, a hacker will use DNS cache poisoning to change what site you visit when you enter a URL. A poisoned DNS cache means that www.yourbankswebsite.com will instead go to a clone site owned by the hacker. This cloned site will look identical to the real thing; if you’re not careful, you’ll end up giving the fake site your login details.

How to Defend Yourself

Never perform any sensitive activities on a public or unsecured network. Err on the side of caution and use something more secure, such as your home Wi-Fi. Also, when you log into a sensitive site, always check for HTTPS in the address bar. If it’s not there, there’s a good chance you’re looking at a fake site!

If you want to perform sensitive activities over a public Wi-Fi network, why not take control of your own privacy? A VPN  service encrypts your data before your computer sends it over the network. If anyone is monitoring your connection, they’ll only see unreadable encrypted packets. Picking a VPN can be difficult, so be sure to read our guide on the best VPN services available.

5. SIM Swapping

SMS authentication codes are some of the biggest problems for hackers. Unfortunately, they have a way to dodge these checks, and they don’t even need your phone to do it!

To perform a SIM swap, a hacker contacts your network provider, claiming to be you. They state that they lost their phone, and that they’d like a transfer of their old number (which is your current number) to their SIM card.

If they’re successful, the network providers strips your phone number from your SIM and installs on the hacker’s instead. This is achievable with a social security number, as we covered in why 2FA and SMS verification isn’t 100% secure.

Once they have your number on their SIM card, they can circumvent SMS codes easily. When they log into your bank account, the bank sends an SMS verification code to their phone rather than yours. They can then log in to your account unimpeded and drain your account.

How to Defend Yourself

Of course, mobile networks typically ask questions to check if the person requesting the transfer is who they say they are. As such, to perform a SIM swap, scammers typically harvest your personal information in order to pass the checks. Even then, some network providers have lax checks for SIM transfers, which allowed hackers to easily perform this trick.

Always keep your personal details private to avoid someone stealing your identity. Also, it’s worth checking if your mobile provider is doing their part to defend you from SIM swapping. If you keep your details safe and your network provider is diligent, a hacker will fail the identification check when they try to SIM swap.

Keeping Your Finances Safe Online

internet banking is very convenient for both customer and hacker alike. Thankfully, you can do your part to ensure you’re not a target of these attacks. By keeping your details safe, you’ll give hackers very little to work with when they take aim at your savings.

If you’d like to know more on keeping your finances safe on the internet, try our guide on buying goods safely online.

Image Credit: stokkete/Depositphotos

Read the full article: 5 Methods Hackers Use to Break Into Your Bank Account

MakeUseOf

Tagged AccountBankBreakHackersIntoMethods

Post navigation

With FIDO2, Android Is Moving Beyond Passwords
How to Sharpen Your Interview Skills With These Soft Skills Questions

Related Posts

$20 Android Smartphone, Drone Deals, and Smart Home Discounts

July 1, 2016July 1, 2016Malika Karoum Dubai

How to Set Your Own Background in Microsoft Teams

May 14, 2020May 14, 2020Malika Karoum Dubai

9 Essential Photography Gear Items Every Camera Newbie Should Own

October 21, 2018October 21, 2018Malika Karoum Dubai

RSS Malika Karoum Global News

  • 1 dead after boat overturns in St. Lawrence River near Kingston: OPP
    Police say the incident happened just north of Grenadier Island in the township of Leeds and the Thousand Islands, about 50 kilometres downstream from Kingston, Ont. 
    Globalnews Digital
  • Manitoba set to become 1st province to ban social media for children
    Premier Wab Kinew did not specify when his plan would be introduced nor did he say the age range of who the potential law would impact.
    Sean Previl
  • Quebec’s new premier to begin 1st foreign mission to Washington
    The visit comes just two months before trade negotiations begin on the Canada-United States-Mexico Agreement, scheduled for July 1.
    Globalnews Digital
  • D.C. shooting suspect aired grievances against Trump in writings to family
    Investigators are treating the writings, along with a trail of social media posts and interviews with family members, as some of the clearest evidence yet of the suspect’s mindset.
    Globalnews Digital
  • Trump to welcome King Charles III to the White House for state visit
    King Charles III and Queen Camilla will visit Washington for a state visit hosted by President Donald Trump and First Lady Melania Trump.
    Pooja Misra
  • Saskatoon’s specialty coffee shops thriving despite rising costs
    A Saskatoon coffee shop is earning rave reviews for its bold brews. They’re helping serve a new generation of coffee drinkers willing to pay more for what’s in their cup.
    Payton Zillich
  • Barnes, Ingram help Raptors past Cavaliers 93-89
    Raptors head coach Darko Rajakovic had a brief Serbian vocabulary lesson for Toronto reporters and fans after a 93-89 win over the Cleveland Cavaliers.
    Globalnews Digital
  • Toronto man’s HIV in remission after bone marrow transplant to treat cancer
    Doctors say a Toronto man has shown no signs of his HIV infection since receiving a bone marrow transplant. If he stays virus-free through 2027, he'll be considered cured.
    Sean Previl
  • ‘Stuck for 20 hours’: Volunteers recall helping drivers stranded by Alberta blizzard
    Drivers were stranded for hours as a blizzard brought whiteout conditions to northern Alberta. Volunteers mobilized to deliver fuel, food and help to those stuck on the highway.
    Prisha Dev
  • Planned glampsite renews longstanding Canmore, Alta. concerns on growth pressures
    An explosion of growth from tourism in Canmore, Alta. has put pressure on scarce housing, not to mention the domino effects on parking, infrastructure and the environment.
    Globalnews Digital

MALIKA KAROUM METAVERSE 2025

  • GPT-5.5 IS HERE! The New OpenAI Model Everyone’s Talking About!
    April 26, 2026 by Dr. Mfon Akpan
    The wait is finally over! OpenAI has just shocked the world with the release of GPT-5.5, a next-generation frontier model that is redefine the boundaries of artificial intelligence. In this video, we break down every single major announcement from the launch, explaining exactly why this new model is the most discussed topic in technology right […]
  • DARKCODE: The Ultimate Hacking & Programming Guide (2026)
    April 19, 2026 by Dr. Mfon Akpan
    Welcome to the frontier of digital mastery. Whether you're a seasoned developer or just starting your journey into the shadows of the web, DARKCODE is your definitive roadmap to understanding the architecture of the modern world.In this comprehensive guide, we strip away the jargon to give you a clear, high-energy look at the intersection of […]
  • Meeting with Gael Gadah 📱
    April 12, 2026 by Dr. Mfon Akpan
    Most businesses do not fail overnight. They bleed slowly from bad decisions, weak systems, and no clear strategy.In this episode, I sit down with Gael Gadah to break down what it really takes to turn a struggling business around. This is not theory. This is execution.We talk about: • How to identify what is actually […]
  • CLAUDE CODE LEAKED! 🚨 The Truth Exposed (Anthropic’s Secret)
    April 5, 2026 by Dr. Mfon Akpan
    Is the future of AI coding in trouble? 🚨 Anthropic’s new Claude Code has been leaked, and the details coming out are shocking. In this video, we dive deep into exactly what was found in the leak, how it impacts developers, and what this means for the competition between Claude, ChatGPT, and GitHub Copilot.We’re breaking […]
  • Replit Agent 4 is INSANE! (Build Entire Apps in Seconds 🚀)
    March 29, 2026 by Dr. Mfon Akpan
    We’re looking at the new reasoning engine, the improved UI/UX capabilities, and why this might be the end of "manual" coding as we know it. 🔥 What we cover: Setting up Replit Agent 4 Prompting for complex app logic Real-time debugging and deployment Comparison: Agent 3 vs Agent 4 If you're looking to build your […]
  • NVIDIA JUST CHANGED EVERYTHING! 🤯 (NemoClaw Explained)
    March 22, 2026 by Dr. Mfon Akpan
    Stop everything. NVIDIA just dropped NemoClaw and it is the MISSING PIECE for the AI revolution. If you thought autonomous agents were risky, think again—the game has officially changed! 🚀 In this video, we’re diving deep into why NVIDIA NemoClaw is the biggest announcement for AI developers and enthusiasts this year. We’re talking full-scale autonomous […]
  • NVIDIA PersonaPlex Explained
    March 15, 2026 by Dr. Mfon Akpan
    What if AI could operate using multiple expert personalities at the same time?In this video, I break down NVIDIA PersonaPlex, a new framework designed to orchestrate multiple AI personas to solve complex tasks. Instead of relying on a single model response, PersonaPlex allows specialized AI agents to collaborate, debate, and refine answers. Think of it […]
  • ChatGPT 5.4 is officially here, and it’s a massive leap forward for AI agents and professional workflows. 🚀
    March 8, 2026 by Dr. Mfon Akpan
    Since ChatGPT 5.4 just launched (March 5, 2026), your content should focus on its "Thinking" mode and native "Computer Use" capabilities.ChatGPT 5.4 is officially here, and it’s a massive leap forward for AI agents and professional workflows. 🚀OpenAI just dropped the most significant update to the GPT-5 family. In this video, we go hands-on with […]
  • The Professional Choice: How Basis AI is Building the Autonomous Accounting Firm
    March 1, 2026 by Dr. Mfon Akpan
    🚀 What is Basis? Basis isn't just a chatbot; it’s a "multi-agent" architecture designed specifically for accounting firms. These agents don't just answer questions—they execute end-to-end tasks like month-end closes, tax preparation, and audit testing.In this video, we cover:The Multi-Agent Shift: Why "Agentic AI" is different from traditional software.Workflow Automation: How Basis handles tax, audit, […]
  • I Tried Seedance 2.0 For The First Time!
    February 22, 2026 by Dr. Mfon Akpan
    In today's video, I am finally diving into Seedance 2.0 to see what all the hype is about. I wanted to give this a real shot and see if I could master the moves or if it would end in a total fail. To make things even more interesting, I’ve given the whole experience a […]
News Portal | Theme: News Portal by Mystery Themes.