Online security guide against hackers, phishing and cyber criminals

Have you ever been a victim of identity theft or of friends who have signed you up with strange sites, perhaps to dating sites by publishing your email or, worse, your telephone number "> hacker" indicates, in a general sense, a person who works with the computer and is capable of programming, experimenting, writing and modifying code .
"Hacker" has gradually developed a darker meaning, generally associated with the so-called " Black Hat " techniques.
Hackers are known to crack (break) security systems or steal sensitive information.
The " White Hat " hackers could do anything with a normal PC but their goal is to look for security holes on the software to correct them and to improve the protections.
The real hackers are however particularly gifted and uncommon people who know how to intuit, invent and discover things that are not written on computer books.
4) How do you find out a password?
To answer this question, I refer to the post on the most used techniques to steal passwords which, almost always, are banal deceptions whose success derives from the naivety and incapacity of the victims.
Weak passwords are the main cause of problems for most ordinary computer users.
A clever hacker will not waste time trying to find complex passwords as the pond is full of defenseless fish.
5) Should I be afraid when it comes to hackers in the newspaper news?
The answer is no.
When a newspaper talks about online security telling stories and businesses like Anonymous, surely these are operations that have the aim of affecting the reputation of large companies and organizations.
Hackers like Anonymous use social networks to make a lot of noise, launching threats and highly effective releases.
The same goes for those " cyber bullies " who pride themselves on being able to enter anyone's computer-
Those to be worried about are the quietest cybercriminals, who make no proclamations and attack without warning.
6) What is Phishing?
One of the tools available to cybercriminals around the world is " Phishing " which is not a virus but a social engineering technique based on fraud and deception.
It doesn't take elaborate software or viruses to get information about a user if he can easily be fooled.
Phishing is based on the most common internet tool: Email .
Just create a fake web page identical to that of the post office, Paypal, Ebay or a bank and then write a message that says " you must confirm your account, access this page and enter the password ", to steal the victim's money.
Even more simply, you can send a message to many people where to ask for money with promises to win large sums or to pay for something that has never been bought.
The Phisher mainly targets older people and those who are easily frightened by fake emergency messages.
Phishing emails are always Spam messages, one of the 5 most common cybercrimes and online crimes.
To protect yourself from phishing there are no special programs, it just takes common sense (see post: How to protect your PC from viruses on the internet).
In other articles then:
- Recognize spam or virus emails
- Protect website accounts
- Protect online bank accounts from scams and email attacks.
6) Can a website infect my computer or steal information?
Absolutely yes, many websites are created only to install viruses on the pc of unsuspecting users, to communicate fake virus problems, to install spy toolbar, to force the user to click on banners or subscribe to spam services.
In another article, some tips and programs for safe surfing and avoiding dangerous sites .
Real-time protection antivirus and antimalware should protect against these sites.
Google recently released a new guide covering various topics, from general online security issues to specific ways to protect Google or other websites.
On the security side, you can read information about malware, phishing, family and shopping on the web.
The Google Safety Center site lists everything you need to do to keep your web accounts safe: use strong passwords, enable double verification where possible (see access to Google or Gmail with double verification and Facebook login with security code), install all browser updates, used programs and Windows, be careful of strange emails and suspicious offers, scan your computer regularly with an updated antivirus.
READ ALSO: Reputation control of sites to buy online without risk

Leave Your Comment

Please enter your comment!
Please enter your name here