As the use of internet is increasing and everything is becoming online, number of hackers have also been increased. We often hear surprising news of hacking millions of credit cards, passwords and other private data of individuals or companies.
Most of us think that hackers attack only big companies and businesses data, and they will not attack our computer. Some think that internet is so wide and why will someone hacked their computer.
They need to know that most hacking targets are those unprotected and easily accessible computers. These computers are used by hackers against hacking of other networks. They can use these computer zombies to send harmful spam emails, viruses and malwares to the other computers.
Page Phishing: 
Page phishing is a technique in which user receives a fake Gmail or face book login page from the hacker. When the user login page and enters the password, it will send password to the hackers.
Key Loggers:
Key logger is used to hack passwords. It gets saved in memory of your computer and stores the key you pressed on key board. By creating a log it transfers to the hacker and in this way we can hack the password.
Viruses sent in Email:
This is a common hacking technique virus on malware are attached to the document on file in the mail. When this file is downloaded or open, viruses also executed into your computer.
RAT:
Remote administration tool (RAT) can hack your computer without your knowledge. It gets connected to your computer which allows hackers to see your screen and all the activities you perform on your computer hackers can steal the important documents from your comport hard disk.
Malware in Antivirus Programs:
Some Hackers offer free antivirus programs on internet which actually contains malware and are developed to damage your computer. Many computers have been infected and hacked by this fake antivirus software.