Hack Cleaners

How much do you know about online dangers?

April 26 is World Intellectual Property Day. How much do you know about proper protection and "net" safety? Do you think you are safe on the internet? Are you aware of all online dangers?

We can all agree that the Internet is one thing that makes our lives much easier. It saves us time in doing daily tasks and makes communication practically free. But the endless possibilities that are made available to us are also available to those with not so good intentions.

In order for someone to break into your computer and grab passwords, they first have to break into your network. This isn't too difficult either if the attacker is persistent and the network is protected by a weaker protocol or a simple password.

Some of the most common online threats are cyber bullying, cyber predators, release of private information, stolen identity, phishing emails, stolen account details, stolen financial details, fraud, chat rooms & social media apps, inappropriate content, online grooming, reputation risk.

Today we write more about phishing and bring you the most important things to remember if you spend some time or all the time on the internet.online dangers Hack Cleaners 03

Who sees our IP address?

The Internet server always sees who it is, from what device and when he accessed the Internet, even to what website. It is obliged to disclose this information to the police or other legal authorities upon request.

The operators of websites / various services / games and similar media that we access also have access to our IP addresses. However, they usually only use these as statistics about the general traffic on their sites.

What happens to the data we publish on the internet and what kind of data is it?

Apart from the inevitable IP address, everything you post on social networks, photos you have posted as profile photos on various online accounts, or any content (image, video, text) you have ever published anywhere stays on the Internet. This content remains stored on internet servers even if you have deleted it in the meantime.

How do you choose a password?

With a good password (at least a dozen characters with upper- and lower-case letters and a few characters), you're already a little more secure. If you want to make sure you've chosen a strong password, you can use online password generators that are created with special programs.

Remember - a good password is hard to remember! Using the same password for several different purposes is simply insecure. While it is difficult and very impractical with the flood of online services, websites and social networks to have a separate password for each, you should still at least consider grouping them together and using a different password for each group.

Take care of your devicesonline dangers Hack Cleaners 04

Don't leave your devices unattended! Does your phone automatically connect to social networks, email services and the like? Very often, we have such an option built in because it makes our daily lives easier.

However, make sure that you don't leave your device unattended. So, if you are in the office and go to lunch or a meeting, lock the workstation, if you are in a cafe, watch your phone and be sure to use a complex password for it.

Be careful what you post

As mentioned earlier, anything you don't want everyone to see, don't post online, even if you delete it. Don't post your own or anyone else's personal information, try to avoid writing the exact date and place of birth, don't post photos of personal documents, etc. Avoid posting photos or videos of children and minors, and addresses where you live or reside.

Do not post photos/videos of the furnishings of the rooms where you live. Avoid sharing information about your vacation or time away from home.

When on social media, be careful who you connect with in "friendships" and use the option to limit what you view or post. This way, the content will only be visible to your friends and not to all users of that social network or the internet.

Be careful what you open

Before you click on an internet link, no matter who sent it to you, think twice! The various computer viruses are programmed so that it only takes one click to download and infect the device you are using.

Computer viruses can be programs that allow unfettered access to all the data on your device, even if a third-party break into your internet accounts and changes your password.

Also watch out for messages in which someone asks you to send them a bank routing number, password, or other sensitive personal information.

Avoid public computers

Use public computers only to search for information and not to connect to any of the available Internet accounts (email, social networks, banking services, etc.).

Public computers are accessible to everyone, so all the data on them is accessible to everyone: from search history to the information needed to log into Internet accounts

Dangerous number one – phishing

What is phishing and how does it compromise Internet security?

Before you get behind the wheel, you need to learn a lot about driving in order to get a valid license to drive a car. There is no such procedure for using the Internet - if you don't want dealing with this type of technology to put you at risk financially, we advise regular education. online dangers Hack Cleaners 02

Phishing is a form of cyber-crime where a target (or targets) is contacted by email, phone or text message by someone pretending to be a legitimate institution and tricking people into giving them their sensitive information - ID card information, credit card numbers and / or passwords.

This information is then used to access accounts or steal identities, and can financially harm the targeted individuals in a variety of ways.

How new is phishing?

The first phishing lawsuit in history was against an American teenager who had created an imitation of the website "America Online". It was a fake site through which he easily obtained data from users' credit cards, thus stealing money from their accounts.

Besides email and web phishing, there is also voice phishing and SMS phishing, and cyber-criminals are developing new techniques every day to deceive users and seriously compromise users' Internet security.

What are the common characteristics of phishing emails?

  • Sounds too good to be true: phishing owes its success to the fact that people love good offers, and that's how it's designed. Great offers, promising statements, and it's hard not to notice them. Try to remember how many messages you've received so far about winning a new cell phone, a vacation, or free clothes. Just don't open such messages. No one benefits from giving things away, always keep that in mind.
  • Giving the impression of urgency: a popular tactic used by cyber criminals is to ask you to do something quickly because it's a really urgent offer with a limited duration. Sometimes they'll convince you that you only have a few minutes to respond. If you come across this type of email, just ignore it. Sometimes you'll be told that your account will be suspended if you don't update your information immediately, don't do it. Check the source of any information you handle or plan to provide sensitive information.
  • Hyperlinks: The link is not always what it seems. If you hover over the link, you will see the real website above it (which may not match the name of the link). Cyber scams are often run by misspelling the names of real sites such as Facebook Support, etc., so read carefully.
  • Attachments: if you see an email attachment that you shouldn't have received or that doesn't make sense, don't open it! Attachments usually contain various types of viruses. The only document format that is safe to open is one with a .txt extension.
  • Unknown Sender: If the sender is someone you don't know, or someone you do know, or if anything seems unusual or unexpected, or deviates from usual patterns of behavior - don't open this email.

The website FBI's Internet Crime Complaint Center reports that people lost $57 million in one year to phishing attacks.

How can you prevent phishing attacks and improve internet security?

Although hackers are constantly finding new techniques to get the data they want, there are a few things you can do to protect yourself and your business:

  • To protect yourself from unwanted (spam) email, use spam filters. Generally, such filters access the source of the message, determine what software sent the message, and check the appearance of the message to determine if it is spam. Occasionally, spam filters may also block regular email, so they cannot be considered 100% effective.
  • Web browser settings must be set to prevent potential scam sites from being opened. If this setting is set, the browser will deny access and display a message.
  • Many sites require users to enter credentials. These types of systems can be vulnerable to security attacks, so we recommend the following: Change your passwords regularly and never use the same password for multiple different accounts.

Caution is never enough. Follow our articles, we will bring you more interesting content.

online dangers Hack Cleaners 01

Written by Ivica Delic

Hack Cleaners Affiliate Disclosure: Some of the links contained in the post or pages are “affiliate links.” This means if you click on the link and purchase or subscribe to a recommended item, We will receive an affiliate commission. We only recommend products or services we believe have value to Hack Cleaners users and readers. This is disclosed in accordance with the Federal Trade Commission’s 16 CFR, Part 255: “Guides Concerning the Use of Endorsements and Testimonials in Advertising. All names, logos, images, and brands are property of their respective owners.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram