How Hackers Hack Your Stuff — and How You Actually Defend It
Defender-focused guides covering how attackers target accounts, devices, networks, and systems. Each page is structured the same way: threat overview, attack mechanisms at a conceptual level, recognition signs, ranked protections, recovery procedures, and organisational defender guidance.
Online Accounts
16 guidesInstagram Accounts
How attackers take over Instagram accounts and how to defend yours.
Read Guide ConsumerFacebook Accounts
How attackers compromise Facebook accounts and how to lock yours down.
Read Guide ConsumerWhatsApp Accounts
How attackers hijack WhatsApp accounts and what protections actually work.
Read Guide ConsumerEmail Accounts
How attackers compromise Gmail, Outlook, and other email accounts — and how to defend.
Read Guide ConsumerCloud Storage Accounts
How attackers compromise Dropbox, Google Drive, and iCloud — and how to defend.
Read Guide ConsumerSnapchat Accounts
How attackers take over Snapchat accounts and how to defend yours.
Read Guide ConsumerTelegram Accounts
How attackers hijack Telegram accounts and what protections actually work.
Read Guide ConsumerTwitter / X Accounts
How attackers compromise Twitter / X accounts and how to lock yours down.
Read Guide ConsumerTikTok Accounts
How attackers target TikTok accounts and the protections that matter.
Read Guide ConsumerLinkedIn Accounts
How attackers abuse LinkedIn for phishing and BEC — and how to defend your professional identity.
Read Guide ConsumerDiscord Accounts
How attackers steal Discord tokens and compromise accounts — and how to harden yours.
Read Guide ConsumerPassword Managers
How attackers target password manager vaults and what actually protects yours.
Read Guide ConsumerGaming Accounts (Steam, PSN, Xbox, Epic)
How attackers steal gaming accounts and in-game items — and how to defend yours.
Read Guide ConsumerYouTube Channels
How attackers hijack YouTube channels for crypto scams and how to protect your creator identity.
Read Guide ConsumerApple ID
How attackers target Apple ID accounts — iCloud, iMessage, Find My — and the protections that matter most.
Read Guide ConsumerZoom Accounts
How attackers hijack Zoom accounts, crash meetings, and abuse recording access — and how to defend yours.
Read GuidePersonal Devices
5 guidesAndroid Phones
How attackers compromise Android devices and how to protect yours.
Read Guide ConsumeriPhones
How attackers target iOS devices and what defences actually matter.
Read Guide ConsumerHome Routers
How attackers compromise home routers and how to harden yours.
Read Guide ConsumerLaptops & PCs
How attackers compromise Windows and Mac computers — and how to defend yours.
Read Guide ConsumerNAS Devices (Synology, QNAP)
How attackers compromise internet-exposed NAS devices — a major ransomware vector — and how to harden yours.
Read GuideNetworks & Connectivity
2 guidesMoney & Crypto
4 guidesBanking Apps & Online Banking
How attackers target banking accounts and what protections actually work.
Read Guide ConsumerCryptocurrency Wallets
How attackers steal cryptocurrency and how to defend your wallet.
Read Guide ConsumerPayPal Accounts
How attackers compromise PayPal accounts and how to defend yours against fraud.
Read Guide ConsumerVenmo, Cash App & P2P Payment Apps
How attackers target peer-to-peer payment apps and how to avoid the common scams.
Read GuideSmart Home & IoT
6 guidesSmart Home Devices
How attackers exploit Alexa, Google Home, and smart-home ecosystems — and how to defend.
Read Guide ConsumerWebcams & Security Cameras
How attackers compromise webcams and IP cameras — and how to lock yours down.
Read Guide ConsumerVideo Doorbells
How attackers compromise Ring, Nest and other video doorbells — and how to lock yours down.
Read Guide ConsumerSmart Locks
How attackers target smart locks and what defences actually matter for physical security.
Read Guide ConsumerSmart TVs
How attackers target Samsung, LG, Roku and other smart TVs — and how to lock yours down.
Read Guide ConsumerBaby Monitors & Nursery Cameras
How attackers hijack baby monitors and nursery cameras — and how to protect your family.
Read GuideProfessional & Enterprise
6 guidesCorporate VPNs
How attackers compromise corporate VPN access and what defenders should monitor.
Read Guide Pro / DefenderRemote Desktop / RDP
How attackers exploit exposed RDP services — the single largest ransomware initial-access vector.
Read Guide Pro / DefenderOffice 365 / Microsoft 365
How attackers compromise Microsoft 365 tenants and what defenders need to monitor.
Read Guide Pro / DefenderGitHub Accounts
How attackers target GitHub accounts and repositories — and how to harden the supply chain.
Read Guide Pro / DefenderActive Directory
How attackers compromise Active Directory domains — kerberoasting, DCSync, golden tickets — and defender controls that matter.
Read Guide Pro / DefenderGoogle Workspace
How attackers compromise Google Workspace tenants and what defender controls actually reduce risk.
Read Guide