Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is Phishing and how to protect yourself?

What is Phishing and how to protect yourself?

What is Phishing?

This is the most common, and the easiest, form of identity theft on the Internet through a fake website. So, the attacker created a fake page that is identical to the real one and tricks you into logging in with your data. You believe in it, enter your data, click on "Login" and - PAF! You have just sent your data to a remote server from which the hacker can read it.

How is this fake page transmitted?

Email used to be more common, but today social networks dominate. When a hacker creates that fake page, he posts it on Facebook, Twitter, etc. but comes up with a good plan that will get users to visit and log in. Most often, these are the inscriptions: "Latest smilies for FB, see the link", or "A million poker chips"... and the like. It is also possible to develop a script that, if activated, sends a phishing page to each of your friends without you even knowing it.

You still need to pay attention to the email. Here, too, they are cunning, so they send you an email where they put a Facebook template and tell you to log in to your account to activate your account. Or they will send you an email stating that you have received a notification and that you must click on the link provided to read it.

How to protect yourself from phishing?

The safest way is to be careful and look at the URL of the site before each login to your account. Hackers usually host their fake sites on free hosts and use free domains, most commonly using  .tk and .co.cc. Also, check that the URL is preceded by HTTPS and who the licensee is. And first of all, check the domain! You know what the original domain reads and you can compare it to a fake one. Be careful with Unicode domains as well - more on that.

You can read what HTTPS is and how to activate it at this link.

Most Antiviruses have a web shield that will prevent pages that are suspected to be fake or contain malware and viruses. Therefore, update the virus database in your AV regularly.

Watch which links you click! If you find the link suspicious, don't click on it. Facebook is full of such links.

I would also recommend this add-on for Chrome, which will increase the protection of that web browser - Windows Defender.

Comments

Popular this month

New Google mobile internet saving application - Datally

I wrote an article on how to save internet traffic on an Android device and I suggested the Onavo Extend and Opera Max apps because they were the most popular back then. Meanwhile, Opera Max has been discontinued and Onavo has been completely redesigned and is now a VPN application with the option to save internet traffic. Their compression technology is probably now used by Facebook in its application because they bought Onavo - link . Google has decided to seize the opportunity and "push" with a new application called " Datally ".

SOPA and PIPA are slowly losing support, the protest yielded results

Controversial U.S. anti-piracy laws, known by the acronyms SOPA and PIPA lost the support of eight members of Congress after major protests by the Internet community. Support was denied, among others, by Marco Rubio of Florida, a rising star of the Republican Party, and his party colleague Roy Blunt of Missouri - who were among the signatories of the bills.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Twitter is celebrating its sixth birthday

Exactly six years ago, one of the founders of Twitter posted his first tweet - " just setting up my twttr ". Although the popularity of this service was modest in the first few years, today Twitter has over 500 million users who send tweets, and messages 140 characters long.

Wireless phone chargers - where, which and how to buy?

Wireless chargers are purchased separately from the device itself, and the user often does not know which Wireless charger to buy or where. Of course, they can be bought from us, not everywhere, but some stores sell them,  which I already wrote about .