Why would a hacker attack you?

  • You might say most hackers are money motivated nowadays, and that there is no value in attacking you. Their target are big companies.

    Value is Subjective: While you might not consider your data valuable, hackers might disagree. Even seemingly innocuous information can be exploited. For example:

    Personal Information: Names, addresses, phone numbers, and birth dates can be used for identity theft or social engineering attacks. They can be sold.

    Login Credentials: Even accounts that seem unimportant could be used to gain access to other accounts or systems. And they can be sold.

    Financial Information: Bank account numbers, credit card details, or even utility bills can be used for fraudulent transactions or to open new accounts in his name. Social media accounts can be sold.

    Device Access: If hackers gain access to your computer or smartphone, they could use it for malicious activities, like sending spam (still profitable) and launching attacks on other systems. It can also be sold.

    The important thing is, while attacking big companies can earn them a lot more money, it is also considerably more difficult to successfully attack. Big companies have the money to buy better defences, the money to employ security teams. While you, the home user, is a much easier target. They might not earn as much per bang, but they can make up for that in numbers. It's is a simple business calculation. If you think it is too troublesome for them to have to attack so many targets, they have hacking tools that make it easy. And they have automation, remember bat files and windows scheduler are automation tools. They don't have to sit there and do it job by job; they just let the task run unattended. Don't be fooled by popular media depiction of a hands on keyboard hacker.

    Remember just because you don't see it in security news sites doesn't mean it is not happening. Newspapers don't report petty burglaries either.

    Not just money. You actually have no way to predict anyone's motive for doing anything. You are only guessing. Think about that.

    You can defend yourself against hackers, you just have to learn how.

  • Make sure you use a password manager and make sure no password is used twice. And MFA. At least this part is a bit protected.

    I recommend Enpass for Password Manager because you decide where to store your passwords database.
    Enpass does not store your passwords so they are no target to hackers.

    Enpass: Secure Passkey & Password Manager That Keeps Your Data On Your Cloud Storage
    With Enpass, choose where your passwords and passkeys are secured and synced – on your personal or business clouds (or even offline). Not on our servers
    www.enpass.io

    “Secure Your World, Protect Your Life.”
    “Empowering Each Other to Stay Secure.”

  • Beware of one point though. If you choose to store your passwords locally. And decide to let other PC sync. There will have to be a port opening with a listening process that ought to be classified as a 'server' process. As any good sys admin will tell you, you don't decide a run a server on a whim. Good, restrictive firewall rules have to be made to accompany it. And if on Linux that has apparmor, apparmor profiles have to be made to whitelist allowed exe's and libraries.

    Edited 2 times, last by VictorM (October 23, 2025 at 4:42 PM).

  • Beware of one point though. If you choose to store your passwords locally. And decide to let other PC sync. There will have to be a port opening with a listening process that ought to be classified as a 'server' process. As any good sys admin will tell you, you don't decide a run a server on a whim.

    Mine are synced with an online personal cloud. Not stored with Enpass.

Participate now!

Don’t have an account yet? Register yourself now and be a part of our community!