Small lexicon about the cybercrime

12:19:00 PM
Small lexicon about the cybercrime -
To avoid being confronted with cybercrime, it is best to understand the different forms it may take. Here are some key words to identify that cybercriminals have concocted to defraud users.
Hacking / Malware The term hacker is a person who has mastered IT and acting in a malicious fashion tent from entering your system (often called a "hacker") to install programs that steal confidential data or distribute spam. Cybercriminals will try to install malicious software on your system. After installing the malware, it will be able to retrieve data you type on your keyboard (such as passwords or credit card number). The cybercriminal can also turn your computer into a "bot" that is to say, use it to send spam, attack other computer infrastructure (DDOS) or even perform an illegal activity by claiming that your computer is the source of the offense. To protect yourself, you must install an antivirus system on your computer or mobile phone and keep the system updated. Also install the latest updates for your operating system. Do not disclose personal information to someone you do not know and make sure to install only programs from a trusted source.

Internet sales
In addition to targeting potential buyers, cybercriminals also target suppliers who use online auction sites or cl assified ads. In general, the interested buyer wants to pay by check will prove to be a fake. Before trying to sell a product to a potential buyer, first check if the seller is clearly identifiable. The seller must be able to provide accurate and verifiable information (name, address, phone number). If the person wishes to pay by check, get some garranty, as the method of payment often favored by scammers.
Internet shopping
purchase products on Internet platforms has become popular, but also attracted many scammers looking to get money from potential buyers. These platforms can involve the online auction sites, classified ads and websites that sell electronic equipment, etc ... The typical scam follows the classic, the victim noticed a section that looks like a price particularly attractive. He then pays the agreed amount, but never receives the item that was purchased. Before trying to purchase something on the Internet, you need to be alerted by four questions: Is the offer too good to be true? Does the site seem trustworthy? The seller may be clearly identifiable? Does the reliable payment method look? If you have any doubt to answer these questions, avoid this site to find a bargain.
Phishing The word is a contraction of the words "Password "(password) and" fishing "(fish). It is practiced by cyber criminals to access confidential data such as access to a set of e-mail account data, auction sites or bank connection (e-banking). To do this, scammers are sending lots of emails that indicate the potential victim is his / her credentials (username and password) to an auction site, for example, are no longer safe or not day, and must be confirmed via a link in the message. The return address was falsified, the link in question therefore does not take the user to the legitimate site page (in this case, the auction site), but on a very similar page designed by fraudsters. If the user enters personal information on this page, he / she immediately becomes a victim, and cybercriminals will not wait to use such personal data as soon as possible. So do not click links in messages that seem bizarre, even if it comes from a parent or friend.

Spam
Spam is messages unsolicited sent by email or SMS. The sending can reach a large number of recipients in a short period of time and cost because it is automated. You can never completely avoid spam, but please send an email with your email address. Use a second address for newsgroups or mailing lists.
Using passwords
Your passwords are the keys to your privacy and Internet access. You must be vigilant to prevent them from being guessed or hacked. The minimum length of a password must be eight signs you can spend letters, numbers and special characters to make them more complex. Do not write your passwords on your computer or on your mobile phone. Your password should not be identical or similar to your username and must be different depending on your access. Finally, make sure to regularly change your passwords (every three months) or whenever you assume that others may know them.
If you want your Internet connection is secure and anonymous, choose a VPN service: it encrypts your Internet connections and keeps secret on the sites you've visited and the information you have left on these sites. This protects all your Internet activities with a secure VPN tunnel virtual, which includes an extremely strong military encryption. Indeed, all traffic through the VPN utilizes AES-256 to encrypt data. AES stands for "Advanced Coding Standards" - a symmetric encryption standard adopted by the US government. It has a fixed block size of 128 bits, with 256-bit key lengths. The AES cipher has been extensively tested and analyzed. It is now used worldwide
AES is the first figure the public approved by the NSA -. National Security Agency - for information classified "top secret. " therefore any connection or pirate decrypting data through the VPN tunnel is strictly impossible.
Previous
Next Post »
0 Komentar