Do not submit resume blindly Art of defeating hackers

Do not submit your information to unknown agency mostley job providers on phone call without verification

In today's digital age, information is power, and unfortunately, hackers have found ways to steal it. Hackers use different techniques to gain access to information, and once they have it, they can use it for malicious purposes. This article will discuss some of the methods hackers use to steal information and how you can protect yourself from such attacks.

Today I introduce you a trick those many hacker or intruder use to harm your internet enabled devices.

In a newspaper I read an advertisement about job opening for multiple positions with irrelevant skill sets & experiences. An advertise has only an email ID for communication. There were no legal website, legal email ID. An advertisement belonging in such categories displayed without verification as per my past experience. It's a good example when someone wish to apply for a job directly sent his resume or CV to such type of email ID blindly without verification of advertiser ads.  Most of us don’t know about the company details. Such type of recruitment ads contain an email ID like XXXXXXXXXXX@gmail.com or XXXXXXXXXXXX@yahoo.com. Means their emails has a public domain.

Now to explore hackers view. What hackers need? Data.  The terrorist activities & bank account theft activities were done with the same trick.  You submitted your all personal details inside the resume or CV expected it will shortlisted soon. This data may be useful for creation of an illegal ID proof or legal document. They theft identity & will ready to attack using your personal information. 

How to submit your resume to recruiter and misguide hackers?

Be a smart learner :

  • Collect information about the advertiser, by finding his organization detail on internet.
  • Always call on the contact number given in ads, listen their voice, pitch, language & story they tell you about job recruitment.
  • If the advertiser is specifying him a placement agency then ask him his office actual address & verify location on google map.
  • It’s a best way to verify the address of advertiser from your contacts located in advertiser city.
  • Read news about the fraud job advertisement on internet because they always repeated same pattern to attract job seekers. Some portal available to show information about such fraud cases online.
  • Create a resume with only related information about your skill sets, education, work experience, short address details, one contact number, email.. try to use contact number & an email those are not attached with any bank. Never mention date of birth. There will be chance if you shortlist then after joining you can submit such details as per requirement.
  • A good job never asked you money, if someone ask you money avoid them & move forward.

Here are some common hacking techniques you must know to trace hackers mind:

Phishing : Phishing is a social engineering technique used by hackers to trick people into giving away sensitive information. They do this by sending emails or messages that appear to be from legitimate sources, such as banks or social media platforms. The emails or messages often contain a link that, when clicked, takes the user to a fake website that looks like the real one. Once the user enters their login details, the hackers can access their accounts and steal sensitive information. To avoid falling victim to phishing attacks, always verify the sender's email address or phone number before clicking any links.


Malware: Malware is a type of software that is designed to harm or disrupt computer systems. Hackers use malware to gain access to sensitive information by infecting a computer with viruses, spyware, or ransomware. Once the malware is installed on the computer, the hacker can access files, steal passwords, and even control the computer remotely. To protect yourself from malware, always keep your antivirus software up to date, avoid downloading suspicious files or emails, and be cautious when browsing the internet.


Social Engineering: Social engineering is a tactic used by hackers to manipulate people into giving away sensitive information. They do this by posing as someone else, such as a bank employee, and asking for personal information, such as login details or credit card numbers. Hackers may also use fake job listings or social media profiles to gain access to personal information. To protect yourself from social engineering attacks, always be cautious when giving out personal information, and verify the identity of the person you are communicating with.


Password Attacks: Password attacks are a common method used by hackers to gain access to user accounts. They do this by guessing or cracking passwords, which can be done using software that can try thousands of combinations in a short amount of time. Hackers can also use brute force attacks, which involve trying every possible combination until the correct one is found. To protect yourself from password attacks, always use strong passwords that are difficult to guess, and enable two-factor authentication whenever possible.


Man-in-the-Middle Attacks: Man-in-the-middle attacks involve intercepting communications between two parties to steal information. Hackers do this by placing themselves between the two parties, such as between a user and a website, and intercepting the data that is being transmitted. This can allow the hacker to steal sensitive information, such as login details or credit card numbers. To protect yourself from man-in-the-middle attacks, always use secure connections when transmitting sensitive information, such as HTTPS or VPNs.


Physical Access: Physical access to a device can also be used by hackers to steal information. They can do this by stealing a device or accessing it when it is unattended. Once they have physical access to the device, they can install malware or steal sensitive information. To protect yourself from physical access attacks, always keep your devices locked when not in use, and never leave them unattended in public places.

In conclusion, hackers use various techniques to steal information, and it is important to be aware of these methods and how to protect yourself from them. Always use strong passwords, keep your software up to date, be cautious when giving out personal information, and use secure connections when transmitting sensitive data. By following these steps, you can help protect yourself from falling victim to hackers and losing your valuable information.

If you feel its helpful, please share with others!!