{"id":10171,"date":"2013-01-30T14:50:53","date_gmt":"2013-01-30T22:50:53","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10171"},"modified":"2015-03-26T13:44:58","modified_gmt":"2015-03-26T20:44:58","slug":"how-a-cyber-criminal-steals-information-off-your-computer","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/","title":{"rendered":"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10463\" title=\"cybercriminal-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-header.jpg\" alt=\"\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-header-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-header-300x187.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to make money by spewing spam on your behalf or by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-computer-is-a-target-for-identity-theft\/\" target=\"_blank\">stealing your identity<\/a>. They&#8217;re after the names and numbers in your address book and want to access your social networking sites and steal your personal data (social security or credit card numbers, bank account information, etc).<\/p>\n<h3>What\u2019s More Valuable, Financial Info or Login Details?<\/h3>\n<p>You might be surprised to know your social networking login details can often be worth more to cybercriminals than your financial information, because there are many protections for consumers against financial fraud but next to none for online accounts like email and social networking. Your social information gives hackers access to your friends on those networks, who then become susceptible to cybercriminal attacks as well.<\/p>\n<p>Need an example? Think of your financial information as a car dealership and your social networking details as a discount store. The discount store carries a ton of items sold for little profit but they sell products all the time, while the car dealership sells fewer items at a lower frequency but a much greater profit. Most cyberattackers work more like a discount store than a car dealership. Financial data is only worth a few bucks for each account, and social networking data isn\u2019t worth a whole lot more. But criminals work to gather enough low-ticket pieces of information to sell in bulk to rack up a big payday.<\/p>\n<p>High-ticket items like corporate or government secrets take a lot more skill to get, because they\u2019re usually much better protected. However, that doesn\u2019t mean you shouldn\u2019t protect your financial data. Both types of information are valuable to cybercriminals, but many focus the bulk of their efforts on the discount store because it contains lucrative low-hanging fruit that hackers of all abilities are all-too-eager to pick.<\/p>\n<h3>How Cybercriminals Attack You<\/h3>\n<p>There are two main ways cybercriminals can attack you: the first is by luring you into using malware to open up your system to them, and the second is by hacking into your accounts or computer directly. Thankfully, there are ways to protect your machine against these attacks. Some methods are effective against both types of attack, while others are more specialized tools.<\/p>\n<p>The most fundamental rule of data security is that no one technology holds the key to protecting everything. It\u2019s important to have multiple layers to protect yourself so the weaknesses of one technology are covered by the strengths of the others. By using a suite of security tools, you can best protect yourself against whatever attacks cybercriminals will throw your way.<\/p>\n<p>Let\u2019s go over the different layers of security and paint a scenario where your computer is a castle built to protect your precious treasure (your data) from dragons and pillagers (hackers and cybercriminals). The following are multiple safeguards to ensure the treasure inside your castle stays secure.<\/p>\n<h3>Firewalls: The Gatekeeper of Network Traffic<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10465\" title=\"castle-door\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-door.jpg\" alt=\"\" width=\"550\" height=\"380\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-door.jpg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-door-150x103.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-door-300x207.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>Firewalls like <a href=\"https:\/\/www.intego.com\/business\/mac-net-barrier\" target=\"_blank\">Intego Net Barrier 2013<\/a> are like the keepers of the castle gates. They allow you to permit or deny things that go in or out of your machine. A firewall asks you whether to allow unknown applications to connect out from your computer and unknown recipients to connect in (or cross the moat and enter the castle). And it will block or permit files or users it has seen before, that you have specified may pass into or out of your machine.<\/p>\n<p>For instance, if you have someone you would like to allow to share your files, you can accept their incoming connection while still keeping out strangers. Or if you\u2019re surfing on a compromised website and it surreptitiously downloads a brand new piece of malware on your machine, it can stop that malware in its tracks before it can send your valuable data back out to the cybercriminal. Your firewall can raise or lower the drawbridge accordingly to make sure that only trusted visitors are allowed inside your castle.<\/p>\n<h3>Anti-Virus: The Security Inside Your Castle<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10489\" title=\"castle-guard\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-guard.jpeg\" alt=\"\" width=\"550\" height=\"308\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-guard.jpeg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-guard-150x84.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/castle-guard-300x168.jpeg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>Most people are familiar with anti-virus software\u2014it\u2019s the most popular way to protect against malware attacks, and it\u2019s an essential tool to get your system back to normal if you are affected by malware. <a href=\"https:\/\/www.intego.com\/business\/mac-virusbarrier\" target=\"_blank\">Intego Virus Barrier 2013<\/a> is our anti-malware tool that does both these jobs.<\/p>\n<p>Virus Barrier is the equivalent of the guards within your castle walls. It has both an on-demand and on-access scanner so you can choose whether to scan quickly or thoroughly, depending on your needs. It\u2019s a good idea to keep your on-access scanner going at all times so it can scan files as you access them. That way, any malware that you come across will be detected before it can run and do damage to your system or steal your data. Think of an on-demand scan as the guards who work in your castle on a regular basis, tasked with protecting your treasure from intruders.<\/p>\n<p>If you were planning a special feast or celebration and instructed your guards to check the dining hall to make sure it\u2019s safe, that\u2019s the equivalent of an on-demand scan. You\u2019d want to schedule it to run once in a while as an extra measure of assurance or if you suspect something fishy is going on with your machine.<\/p>\n<p>Automatic updates make it simple to keep your machine continuously updated against all the latest threats (like showing your guards \u201cWanted\u201d posters of new thieves and criminals so they know who to look out for). All in all, Virus Barrier is designed to be a method of protection against code that seeks to do you harm, that you can set up and rely on without giving it too much thought.<\/p>\n<h3>Data Scrubbing: A Map That Locates Your Hidden Treasure<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10467\" title=\"treasure-map\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/treasure-map.jpg\" alt=\"\" width=\"550\" height=\"435\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/treasure-map.jpg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/treasure-map-150x118.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/treasure-map-300x237.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>One of the trickiest things about protecting your valuable data is being aware of where exactly it resides on your machine. Do you know the exact whereabouts of all the treasure in your castle? Some apps and actions can store sensitive data all over the place, far away from where you would ever think to look. Cybercriminals know this and don\u2019t limit their searches to the obvious locations. <a href=\"https:\/\/www.intego.com\/business\/mac-identity-scrubber\" target=\"_blank\">Intego Identity Scrubber<\/a> identifies exactly where specific sensitive information is on your computer so you can better protect your data in the event someone does manage to cross the moat and get past the guards.<\/p>\n<p>Running Identity Scrubber will let you know where information such as credit card numbers, social security or driver license numbers, bank account information, passwords, telephone numbers, and any custom data resides so you can better protect it with encryption or choose to delete it. This way, cybercriminals will have a much harder time grabbing information that might be useful for <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-computer-is-a-target-for-identity-theft\/\" target=\"_blank\">identity theft<\/a>.<\/p>\n<h3>Working Together to Create Layers of Security<\/h3>\n<p>When combined, all these tools make your machine a less profitable target for cybercriminals. With <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/virusbarrier-2013\">Virus Barrier<\/a> and <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/net-barrier-2013\">Net Barrier<\/a>, your machine is less likely to be breached in the first place. And if they\u2019re still somehow about to get in, <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/identity-scrubber\">Identity Scrubber<\/a> will help you keep cybercriminals\u2019 efforts from being worthwhile. Each of these products is offered in both Intego <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium\">Mac Internet Security Premium<\/a> and Intego <a href=\"https:\/\/www.intego.com\/Intego-mac-premium-bundle\">Mac Premium Bundle<\/a> to make sure your castle and its treasure are protected in multiple effective ways.<\/p>\n<p>In a world where too few people take security seriously, you don\u2019t need to have your system so locked down that it\u2019s unusable, or to have a degree in computer science to understand how to keep yourself safe. You can have a simple, layered security system that doesn\u2019t bog you down.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to make money by spewing spam on your behalf or by stealing your identity. They&#8217;re after the names and numbers in your address book and want to access your social networking sites [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10495,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151],"tags":[291,215,231,305],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft) - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-30T22:50:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T20:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/\",\"name\":\"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft) - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage\"},\"datePublished\":\"2013-01-30T22:50:53+00:00\",\"dateModified\":\"2015-03-26T20:44:58+00:00\",\"description\":\"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\\u2019s processing power to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)\",\"datePublished\":\"2013-01-30T22:50:53+00:00\",\"dateModified\":\"2015-03-26T20:44:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage\"},\"wordCount\":1309,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg\",\"keywords\":[\"Cybercrime\",\"Identity Theft\",\"Information Security\",\"Layered Security\"],\"articleSection\":[\"How To\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft) - The Mac Security Blog","og_description":"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-01-30T22:50:53+00:00","article_modified_time":"2015-03-26T20:44:58+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/","name":"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft) - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage"},"datePublished":"2013-01-30T22:50:53+00:00","dateModified":"2015-03-26T20:44:58+00:00","description":"Most attacks these days are financially motivated, which means cybercriminals are trying to get at either your data or your computer\u2019s processing power to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)","datePublished":"2013-01-30T22:50:53+00:00","dateModified":"2015-03-26T20:44:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#webpage"},"wordCount":1309,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg","keywords":["Cybercrime","Identity Theft","Information Security","Layered Security"],"articleSection":["How To","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/cybercriminal-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2E3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10171"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10171"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10171\/revisions"}],"predecessor-version":[{"id":13135,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10171\/revisions\/13135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10495"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}