Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is Phishing and how to protect yourself?

What is Phishing and how to protect yourself?

What is Phishing?

This is the most common, and the easiest, form of identity theft on the Internet through a fake website. So, the attacker created a fake page that is identical to the real one and tricks you into logging in with your data. You believe in it, enter your data, click on "Login" and - PAF! You have just sent your data to a remote server from which the hacker can read it.

How is this fake page transmitted?

Email used to be more common, but today social networks dominate. When a hacker creates that fake page, he posts it on Facebook, Twitter, etc. but comes up with a good plan that will get users to visit and log in. Most often, these are the inscriptions: "Latest smilies for FB, see the link", or "A million poker chips"... and the like. It is also possible to develop a script that, if activated, sends a phishing page to each of your friends without you even knowing it.

You still need to pay attention to the email. Here, too, they are cunning, so they send you an email where they put a Facebook template and tell you to log in to your account to activate your account. Or they will send you an email stating that you have received a notification and that you must click on the link provided to read it.

How to protect yourself from phishing?

The safest way is to be careful and look at the URL of the site before each login to your account. Hackers usually host their fake sites on free hosts and use free domains, most commonly using  .tk and .co.cc. Also, check that the URL is preceded by HTTPS and who the licensee is. And first of all, check the domain! You know what the original domain reads and you can compare it to a fake one. Be careful with Unicode domains as well - more on that.

You can read what HTTPS is and how to activate it at this link.

Most Antiviruses have a web shield that will prevent pages that are suspected to be fake or contain malware and viruses. Therefore, update the virus database in your AV regularly.

Watch which links you click! If you find the link suspicious, don't click on it. Facebook is full of such links.

I would also recommend this add-on for Chrome, which will increase the protection of that web browser - Windows Defender.

Comments

Popular this month

Google offline maps - instructions

Google has recently added several new features to its maps, including Offline maps and turn-by-turn navigation. It was these two options that were missing so that Google Maps  that could be used as a standalone offline navigation app.

SIM card sizes (Mini, Micro, Nano) - explanation

Many users still complain about the size of SIM (subscriber identification module) cards. Which one goes on the phone? Can it be shortened? Can a smaller one into a larger slot? Although we are slowly switching to eSIM (more on this in this article ), we still use classic SIM cards. Newer phones usually require a Nano sizes, but operators issue SIM cards in all sizes. More precisely, now SIM cards are made so that the user can choose the size immediately, and later change it if necessary. More on that at the end of the article.

What should you check before buying a used phone?

If you buy a used phone from an unknown person, or even from a known person, you must always check the phone for any damage - visible or hidden. But what all needs to be checked? How? That is exactly what I am writing in this article!

SOPA is retiring for now

Lamar Smith said he is withdrawing the controversial SOPA law for now until they find a solution. Namely, the people behind this have obviously taken the protests of Wikipedia , Google, Reddit, and other big companies around the world seriously.

How to Decode a Mobile Phone

How to Decode a Mobile Phone? For many owners of new mobile phones that come with a subscription package from one of the mobile operators, this is an important issue. Many get the phone at a symbolic price of 1 dinar and do not intend to use it in the network in which they signed the contract . The problem is that such phones are always locked to the network they are from, and cannot be used in another network.