Skip to content
Sunday, February 01, 2026
MALIKA KAROUM METAVERSE

MALIKA KAROUM METAVERSE

– THE NEW WEB 3.0 FUTURE –

  • Definitions of Metaverse
  • Malika Karoum: Artificial Intelligence
  • Malika Karoum: ChatGPT
  • Malika Karoum Metaverse
    • Metaverse Digital Virtual Environment
    • A FUTURE METAVERSE
    • METAVERSE -THE NEW FUTURE-
    • Art – The Next Generation
    • The New Web 3.0
    • Metaverse project
    • What are Non Fungible Tokens (NFT-tokens)?
    • What are NFTs?
  • Malika Karoum Media

5 Methods Hackers Use to Break Into Your Bank Account

Malika Karoum Online News
February 26, 2019February 26, 2019Malika Karoum Dubai
hackers-bank-account

With so many users making the jump to internet banking, it’s no wonder that hackers are on the hunt for login details. What may be surprising, however, are the lengths that hackers go to in order to access your finances.

Here’s a look at how hackers target your bank account and how to stay safe.

1. Mobile Banking Trojans

These days, you can manage all of your finances from your smartphone. Usually, a bank will supply an official app from which you can log in and check your account. While convenient, this has become a key attack vector for malware authors.

Fake Apps

The simpler means of attack is by spoofing an existing banking app. A malware author creates a perfect replica of a bank’s app and uploads it to shady third-party sites. Once you’ve downloaded the bad app, you enter your username and password into it, which is then sent to the hacker.

App Hijacking

The sneakier version of this is the mobile banking Trojan. These aren’t disguised as a bank’s official app; they’re usually a completely unrelated app with a Trojan installed within. When you install this app, the Trojan begins to scan your phone for banking apps.

When it detects a banking app being launched, the malware quickly puts up a window that looks identical to the app you just booted up. If this is done smoothly enough, the user won’t notice the swap and will enter their details into the fake login page. These details are then uploaded to the malware author.

Typically, these Trojans also need an SMS verification code to complete the hack. To do this, they’ll often ask for SMS read privileges during install, so they can steal the codes as they come in.

How to Defend Yourself

When downloading apps from the app store, keep an eye on the amount of downloads it has. If it has a very low amount of downloads and little to no reviews, it’s too early to call if it has malware or not.

This goes double if you see an “official app” for a very popular bank with a small download count—it’s likely an imposter! If you’re interested in learning more, be sure to read our guide on how to avoid Trojans.

Likewise, be careful with what permissions you give apps. If a mobile game asks you for SMS read permissions with no explanation as to why it wants them, stay safe and don’t allow the app to install. Never install apps from third-party sites, as they’re more likely to contain malware.

2. Phishing

As the public becomes savvy toward phishing tactics, hackers have escalated their efforts to trick people into clicking their links. One of their nastiest tricks is hacking the email accounts of solicitors and sending phishing emails from a previously-trusted address.

What makes this hack so devastating is how hard it would be to spot the scam. The email address would be legitimate, and the hacker could even to talk to you on a first-name basis. This is exactly how an unfortunate home buyer lost £67,000, despite replying to an email address that was previously legitimate.

How to Defend Yourself

Obviously, if an email address looks suspicious, treat its contents with a healthy dose of skepticism. If the address looks legitimate but something “seems off,” see if you can validate the email with the person sending it—preferably not over email, in case the hackers have compromised the account!

3. Keyloggers

This method of attack is one of the quieter ways a hacker can gain access to your bank account. Keyloggers are a type of malware that records what you’re typing and sends the information back to the hacker.

That might sound inconspicuous at first, but imagine what would happen if you typed in your bank’s web address, followed by your username and password. The hacker would have all the information they need to break into your account!

How to Defend Yourself

Install a stellar antivirus and make sure it checks your system every so often. A good antivirus will sniff out a keylogger and erase it before it can do damage.

If your bank supports two-factor authentication, be sure to enable this. This makes a keylogger far less effective, as the hacker won’t be able to replicate the authentication code even if they get your login details.

4. Man-in-the-Middle Attacks

Sometimes, a hacker will target the communications between you and your bank’s website in order to get your details. These attacks are called Man-in-the-Middle (MITM) attacks, and the name says it all; it’s when a hacker intercepts communications between you and a legitimate service.

Usually, an MITM attack involves monitoring an insecure server and analyzing the data that passes through. When you send your login details over this network, the hackers “sniff out” your details and steal them.

Sometimes, however, a hacker will use DNS cache poisoning to change what site you visit when you enter a URL. A poisoned DNS cache means that www.yourbankswebsite.com will instead go to a clone site owned by the hacker. This cloned site will look identical to the real thing; if you’re not careful, you’ll end up giving the fake site your login details.

How to Defend Yourself

Never perform any sensitive activities on a public or unsecured network. Err on the side of caution and use something more secure, such as your home Wi-Fi. Also, when you log into a sensitive site, always check for HTTPS in the address bar. If it’s not there, there’s a good chance you’re looking at a fake site!

If you want to perform sensitive activities over a public Wi-Fi network, why not take control of your own privacy? A VPN  service encrypts your data before your computer sends it over the network. If anyone is monitoring your connection, they’ll only see unreadable encrypted packets. Picking a VPN can be difficult, so be sure to read our guide on the best VPN services available.

5. SIM Swapping

SMS authentication codes are some of the biggest problems for hackers. Unfortunately, they have a way to dodge these checks, and they don’t even need your phone to do it!

To perform a SIM swap, a hacker contacts your network provider, claiming to be you. They state that they lost their phone, and that they’d like a transfer of their old number (which is your current number) to their SIM card.

If they’re successful, the network providers strips your phone number from your SIM and installs on the hacker’s instead. This is achievable with a social security number, as we covered in why 2FA and SMS verification isn’t 100% secure.

Once they have your number on their SIM card, they can circumvent SMS codes easily. When they log into your bank account, the bank sends an SMS verification code to their phone rather than yours. They can then log in to your account unimpeded and drain your account.

How to Defend Yourself

Of course, mobile networks typically ask questions to check if the person requesting the transfer is who they say they are. As such, to perform a SIM swap, scammers typically harvest your personal information in order to pass the checks. Even then, some network providers have lax checks for SIM transfers, which allowed hackers to easily perform this trick.

Always keep your personal details private to avoid someone stealing your identity. Also, it’s worth checking if your mobile provider is doing their part to defend you from SIM swapping. If you keep your details safe and your network provider is diligent, a hacker will fail the identification check when they try to SIM swap.

Keeping Your Finances Safe Online

internet banking is very convenient for both customer and hacker alike. Thankfully, you can do your part to ensure you’re not a target of these attacks. By keeping your details safe, you’ll give hackers very little to work with when they take aim at your savings.

If you’d like to know more on keeping your finances safe on the internet, try our guide on buying goods safely online.

Image Credit: stokkete/Depositphotos

Read the full article: 5 Methods Hackers Use to Break Into Your Bank Account

MakeUseOf

Tagged AccountBankBreakHackersIntoMethods

Post navigation

With FIDO2, Android Is Moving Beyond Passwords
How to Sharpen Your Interview Skills With These Soft Skills Questions

Related Posts

The 10 Best New Features of macOS Mojave

October 2, 2018October 2, 2018Malika Karoum Dubai

Apple Names the Best Apps and Games of 2019

December 4, 2019December 4, 2019Malika Karoum Dubai

Wednesday Roundup: Playstation Wireless Headset, Game of Thrones Blu-rays, and the Most Affordable Earphones [UK]

June 14, 2017Malika Karoum Dubai

RSS Malika Karoum Global News

  • 3 arrested after early-morning shots fired in Surrey, police suspect extortion
    Police were patrolling the area around Crescent Road and 132 Street in Surrey before 4 a.m. Sunday when they received reports of gunshots and a small fire outside a residence.
    Prisha Dev
  • Thousands rally in Toronto to support Iran uprising, call for regime change
    Thousands gathered in Toronto to support the Iranian people and call for the fall of the Islamic regime as deadly protests continue across Iran.
    Globalnews Digital
  • 3 underage Quebec girls pulled from York Region home in trafficking investigation
    Police in Ontario said on Saturday that three girls from Quebec have been found in Richmond Hill. Two males, aged 23 and 17, from the GTA now face human trafficking charges.
    Prisha Dev
  • Oilers place goaltender Pickard on waivers
    The Edmonton Oilers have placed goaltender Calvin Pickard on waivers.
    Globalnews Digital
  • ‘The system let her down’: Mother of Nykera Brown calls for appeal as judge acquits Andrew Rosenfeldt
    Andrew Rosenfeldt's second-degree murder trial ended Friday in a not-guilty verdict in the 2022 death of Nykera Brown. Brown's mother is calling for an appeal of the decision.
    Grace Miller
  • Bouchard named NHL’s third star of the month
    Edmonton Oilers defenceman Evan Bouchard has been named the NHL's third star of the month.
    Globalnews Digital
  • Moves abound with CFL negotiation window opening
    The CFL's free-agency process opened with quite a bang Sunday.
    Globalnews Digital
  • Drainville officially enters race to lead CAQ
    Bernard Drainville is officially entering the race to succeed François Legault as leader of the governing Coalition Avenir Québec.
    Globalnews Digital
  • Precautionary boil water advisory issued for Newfoundland town
    A precautionary boil water advisory has been issued for the Town of Badger, N.L., due to flooding, according to an announcement Saturday night.
    Prisha Dev
  • Judge orders 5-year-old Liam Conejo Ramos and his dad released from ICE detention
    A federal judge ordered the release of a five-year-old boy and his father from a Texas immigration detention centre, criticizing the Trump administration’s enforcement tactics.
    Globalnews Digital

MALIKA KAROUM METAVERSE 2025

  • Emergent and Clawdbot Compared: Everything You Need to Know
    February 1, 2026 by Dr. Mfon Akpan
    The ultimate AI showdown is here as we put Emergent and Clawdbot head-to-head to see which one actually reigns supreme in 2026. In this video, I break down the core features, performance capabilities, and unique strengths of both platforms—comparing Emergent's rapid "vibe coding" app generation against Clawdbot's proactive, self-hosted agent power. Whether you are looking […]
  • Rocket App Builder Part 3: Mastering Databases & User Auth! 🚀
    January 25, 2026 by Dr. Mfon Akpan
    Welcome back to our Rocket App Builder series! In Part 3, we’re diving deep into the engine room. We'll show you exactly how to set up your database, manage user authentication, and make your app truly functional. In this video, we cover: ✅ Setting up your first database table. ✅ Connecting user login/sign-up flows. ✅ […]
  • I Tried Rocket AI for 7 Days... This is UNREAL (Part 2)
    January 18, 2026 by Dr. Mfon Akpan
    The future of AI is moving faster than anyone expected, and we are back for Part 2 to show you exactly why Rocket AI is leading the charge. In this deep-dive session, we’re moving past the basics and unlocking the advanced strategies, hidden features, and automation workflows that most users don't even know exist. Whether […]
  • 🚀 Build Your Dream App in MINUTES! (No Code Required)
    January 16, 2026 by Dr. Mfon Akpan
    🚀 Build Your Dream App in MINUTES! (No Code Required)Stop dreaming and start building! In this video, I’m doing a full deep-dive demo of Rocket, the app-building platform that is changing the game for creators, entrepreneurs, and non-coders everywhere.I’ll show you exactly how I went from a blank screen to a fully functional, professional-grade app […]
  • Can Gemini Beat ChatGPT (in image creation)?
    January 4, 2026 by Dr. Mfon Akpan
    Is Nano Banana actually better than ChatGPT? 🍌🆚🤖Today we’re putting the internet's favorite "speed artist," Google’s Nano Banana (Gemini 3 Pro Image), up against the veteran king of precision, ChatGPT (DALL-E 3).Nano Banana has taken the world by storm with its insane Multi-Image Fusion and Subject Consistency—but can it beat ChatGPT when it comes to […]
  • The Death of Entry Level Jobs. (It’s over?)
    December 28, 2025 by Dr. Mfon Akpan
    Is the entry-level job market actually dead? In 2025, landing your first "real" job feels harder than ever. From AI taking over junior tasks to the "5 years of experience for an internship" paradox, the ladder is broken.In this video, we dive into:Why "Entry Level" doesn't mean what it used to.How AI is impacting junior-level […]
  • AI Is Building Worlds And Most People Are Not Read
    December 21, 2025 by Dr. Mfon Akpan
    Artificial intelligence has moved beyond tools and is now building environments, spaces, and digital worlds. In this video, I examine Spaitial AI and explain why world building represents a structural shift in how technology interacts with humans. This is not about prompts or productivity hacks. This is about infrastructure and agency. I walk through what […]
  • ChatGPT 5.2 Just Dropped. EVERYTHING Has Changed.
    December 14, 2025 by Dr. Mfon Akpan
    OpenAI just released ChatGPT 5.2, and honestly, I wasn't expecting this. In this video, we push the new model to its absolute breaking point to see if AGI is finally here. The reasoning capabilities have completely shifted—if you are still using GPT-4o, you are falling behind.In this video, I cover:🚀 The Speed Upgrade: Is it […]
  • I Found the SECRET to a VIRAL Metaverse! (Spatial Platform UNLOCKED)
    December 7, 2025 by Dr. Mfon Akpan
    Did I just break the metaverse? For months, I’ve been experimenting with the Spatial platform, and I think I've cracked the code on what makes a truly viral virtual experience. Forget static rooms—this video shows you the cutting-edge design, interactivity, and engagement strategies that are guaranteed to draw a crowd to your virtual world!
  • GEMINI AI: Create Your INTERACTIVE RESEARCH WEBSITE (NO-CODE!)
    November 30, 2025 by Dr. Mfon Akpan
    Learn how to leverage Gemini AI to effortlessly build a stunning and interactive webpage for your research! This tutorial shows you how to transform your data into a dynamic portal without writing a single line of code. Perfect for students, researchers, and anyone looking to showcase their work in an engaging way.
News Portal | Theme: News Portal by Mystery Themes.