Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is Phishing and how to protect yourself?

What is Phishing and how to protect yourself?

What is Phishing?

This is the most common, and the easiest, form of identity theft on the Internet through a fake website. So, the attacker created a fake page that is identical to the real one and tricks you into logging in with your data. You believe in it, enter your data, click on "Login" and - PAF! You have just sent your data to a remote server from which the hacker can read it.

How is this fake page transmitted?

Email used to be more common, but today social networks dominate. When a hacker creates that fake page, he posts it on Facebook, Twitter, etc. but comes up with a good plan that will get users to visit and log in. Most often, these are the inscriptions: "Latest smilies for FB, see the link", or "A million poker chips"... and the like. It is also possible to develop a script that, if activated, sends a phishing page to each of your friends without you even knowing it.

You still need to pay attention to the email. Here, too, they are cunning, so they send you an email where they put a Facebook template and tell you to log in to your account to activate your account. Or they will send you an email stating that you have received a notification and that you must click on the link provided to read it.

How to protect yourself from phishing?

The safest way is to be careful and look at the URL of the site before each login to your account. Hackers usually host their fake sites on free hosts and use free domains, most commonly using  .tk and .co.cc. Also, check that the URL is preceded by HTTPS and who the licensee is. And first of all, check the domain! You know what the original domain reads and you can compare it to a fake one. Be careful with Unicode domains as well - more on that.

You can read what HTTPS is and how to activate it at this link.

Most Antiviruses have a web shield that will prevent pages that are suspected to be fake or contain malware and viruses. Therefore, update the virus database in your AV regularly.

Watch which links you click! If you find the link suspicious, don't click on it. Facebook is full of such links.

I would also recommend this add-on for Chrome, which will increase the protection of that web browser - Windows Defender.

Comments

Popular this month

Facebook is introducing another new service

Facebook is preparing another novelty for us. This is the  " Listen With Friends " application that will soon appear on chats , and with it, you will be able to listen to music with the person you are corresponding with.

Interesting gadgets for less than $5 [2. part]

Due to the great interest in the article in which I presented several interesting gadgets that cost less than $ 5 , I decided to compile another list. Note :  all the products I listed below can be purchased on various sites, but I posted links to Aliexpress because I have bought a lot there and have the most experience.

Android TV Box - a guide to buying up to 30 euros

What is Android TV Box? This is a great solution if you want to add a " Smart " function to an existing TV . With this device, you can watch live TV online for free (later on), play games, upload all kinds of files, watch movies (from USB, over the internet, phone…), listen to songs, surf the internet, use social networks… or everything you can on your Android phone. It is usually a cube-shaped device (but it doesn't have to be) and has various inputs and outputs. It connects to the TV via an HDMI cable , but some also have an AV output over 3.5mm that goes to the familiar 3 cinches, so you can also connect to an older TV (even to SCART if you have an adapter). It is also standard for these devices to have WiFi , LAN port (RJ45), IR Remote , at least 2 USB ports , support for high definition video formats (these cheap ones often have 4K support), and usually come with a remote .

Android ROOT - programs and applications

I have already written several posts on how to root an Android device, so I decided to make one in which I will unite everything.

Serbia will soon have the strongest supercomputer in the Balkans!

By upgrading the "Paradox" supercomputer, Serbia will receive in the next few months the most powerful supercomputer in the Balkans, worth around one million euros! Today, the " Paradox " supercomputer has 1,100 processors and operates at seven teraflops, which is 7,000 billion operations per second. With the upgrade, the computer will have 5,000 processors and will work at 40 teraflops, or 40,000 billion operations per second. It can currently store 60 terabytes (60,000 gigabytes) of data.