Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is Phishing and how to protect yourself?

What is Phishing and how to protect yourself?

What is Phishing?

This is the most common, and the easiest, form of identity theft on the Internet through a fake website. So, the attacker created a fake page that is identical to the real one and tricks you into logging in with your data. You believe in it, enter your data, click on "Login" and - PAF! You have just sent your data to a remote server from which the hacker can read it.

How is this fake page transmitted?

Email used to be more common, but today social networks dominate. When a hacker creates that fake page, he posts it on Facebook, Twitter, etc. but comes up with a good plan that will get users to visit and log in. Most often, these are the inscriptions: "Latest smilies for FB, see the link", or "A million poker chips"... and the like. It is also possible to develop a script that, if activated, sends a phishing page to each of your friends without you even knowing it.

You still need to pay attention to the email. Here, too, they are cunning, so they send you an email where they put a Facebook template and tell you to log in to your account to activate your account. Or they will send you an email stating that you have received a notification and that you must click on the link provided to read it.

How to protect yourself from phishing?

The safest way is to be careful and look at the URL of the site before each login to your account. Hackers usually host their fake sites on free hosts and use free domains, most commonly using  .tk and .co.cc. Also, check that the URL is preceded by HTTPS and who the licensee is. And first of all, check the domain! You know what the original domain reads and you can compare it to a fake one. Be careful with Unicode domains as well - more on that.

You can read what HTTPS is and how to activate it at this link.

Most Antiviruses have a web shield that will prevent pages that are suspected to be fake or contain malware and viruses. Therefore, update the virus database in your AV regularly.

Watch which links you click! If you find the link suspicious, don't click on it. Facebook is full of such links.

I would also recommend this add-on for Chrome, which will increase the protection of that web browser - Windows Defender.

Comments

Popular this month

Check if your computer is male or female

One small and interesting trick you can use to check whether your computer is male or female. All you have to do is an open notepad and copy the following script: CreateObject("SAPI.SpVoice").Speak"Am I male or female" (I recommend copying it from THIS link)

How to hack WiFi using Android device

" How to hack wifi " - is one of the common questions I get, so I decided to present here some Android applications that can help with that. Let me immediately mention: in this text, you will not learn how to hack a WiFi password, but how to hack other users on that network. If you still want to hack your WiFi password, look for instructions HERE .

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

Google AI game recognizes and learns what you draw!

Artificial intelligence (AI) is quite popular nowadays and is being used more and more intensively. Google has, I can say, the most developed so far and is available to end-users (at least one part). We had a chance to see how it is integrated into the new Google Assistant that has replaced Google Now.