Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is Phishing and how to protect yourself?

What is Phishing and how to protect yourself?

What is Phishing?

This is the most common, and the easiest, form of identity theft on the Internet through a fake website. So, the attacker created a fake page that is identical to the real one and tricks you into logging in with your data. You believe in it, enter your data, click on "Login" and - PAF! You have just sent your data to a remote server from which the hacker can read it.

How is this fake page transmitted?

Email used to be more common, but today social networks dominate. When a hacker creates that fake page, he posts it on Facebook, Twitter, etc. but comes up with a good plan that will get users to visit and log in. Most often, these are the inscriptions: "Latest smilies for FB, see the link", or "A million poker chips"... and the like. It is also possible to develop a script that, if activated, sends a phishing page to each of your friends without you even knowing it.

You still need to pay attention to the email. Here, too, they are cunning, so they send you an email where they put a Facebook template and tell you to log in to your account to activate your account. Or they will send you an email stating that you have received a notification and that you must click on the link provided to read it.

How to protect yourself from phishing?

The safest way is to be careful and look at the URL of the site before each login to your account. Hackers usually host their fake sites on free hosts and use free domains, most commonly using  .tk and .co.cc. Also, check that the URL is preceded by HTTPS and who the licensee is. And first of all, check the domain! You know what the original domain reads and you can compare it to a fake one. Be careful with Unicode domains as well - more on that.

You can read what HTTPS is and how to activate it at this link.

Most Antiviruses have a web shield that will prevent pages that are suspected to be fake or contain malware and viruses. Therefore, update the virus database in your AV regularly.

Watch which links you click! If you find the link suspicious, don't click on it. Facebook is full of such links.

I would also recommend this add-on for Chrome, which will increase the protection of that web browser - Windows Defender.

Comments

Popular this month

How to ROOT a phone in 30 seconds

Recently, an application appeared that ROOTs some Android devices in a few seconds! You don't need Odin or anything else, just that app, and in a few seconds, your phone is rooted. An app called  ExynosAbuse can be found on the XDA forum, downloaded, and installed for free on your phone. After starting, all you have to do is press " Root device " and it will do its job in a few seconds. You don't even have to restart your phone, you will only be notified that the ROOT has passed successfully and you will see the SuperSu icon.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Check if your computer is male or female

One small and interesting trick you can use to check whether your computer is male or female. All you have to do is an open notepad and copy the following script: CreateObject("SAPI.SpVoice").Speak"Am I male or female" (I recommend copying it from THIS link)