When
we browse the Internet and share information through a portable device such as
a memory card, we know that we are exposed to some malicious files such as
viruses or in the case of the Internet, downloading any type of content that
may affect the operation of the computer, In some cases, we allow our personal
information to be exposed and for this we must know what measures are really
useful and effective. We all know keeping our information is so safe so using a
software that gives us total
security is the most important thing we need.
A
summary was recently shared about practices that are not truly effective or
situations that the user might think are not risky.
Here
we share 6 myths about computer security:
Myth 1: Shopping On the Internet.
Belief: If I don't buy products or
contract services on the Internet, I cannot become another victim of
cybercrime.
Reality: Even people who do not shop or
bank on the Internet can be affected by cybercrime. A single visit to an
infected website, or even a virus-free website, but with an infected ad banner,
is enough for your computer to be infected by an illegal activity software
program, such as a bot or a Troy Horse.
Myth 2: Sharing Passwords With My Family Is Safe.
Belief: It is not risky to let other
people use my equipment, or share my passwords with them, as long as they are
members of my family or very trusted friends.
Reality: Anyone can be the victim of an
attack on the Internet. Cybercriminals use automated tools to send millions of
fraudulent emails in hopes of finding a small number of vulnerable victims.
They don't care who has paved the way for them to infect a computer, be it an
adult or a child, as long as they are fooled and make a mistake. Cybercriminals
act fast, and the smallest mistake is enough to open Pandora's Box. It is
preferable not to share your passwords, not even those for accessing the
computer.
Myth 3: I'm not famous, no one will steal my identity.
Belief: The Internet is so big that I
shouldn't worry about things like identity theft. The probability of me
becoming a victim is minimal, unless I am a public figure or famous person.
Reality: Automated bot programs
constantly search the Internet for new victims they can infect. Even if you are
not famous, or try to remain inconspicuous online, this relentless variety of
illegal activity software will put your computer's security to the test. In
addition, the volume of fraudulent phishing emails that are sent every day is
so high that it is very likely that, sooner or later, you will receive a false
message ... Although users who use the Internet frequently have a greater
chance of becoming victims, anyone who uses the Internet is exposed to threats.
Myth 4: I already have a Firewall, I'm safe.
Belief: I am protected against identity
theft on the Internet if I have a firewall that blocks intruders, hackers and
criminals.
Fact: Firewall software is an
excellent first step in protecting your computer, but it is only the first line
of defense. In fact, software alone is incapable of fully protecting you
against online identity theft, as today's attacks can incorporate a
psychological facet and trick the victim into revealing sensitive information
rather than exploiting a flaw of the software.
Myth 5: Photos are virus-free.
Belief: Not all programs are risky: For
example, it is impossible for photos to contain harmful codes.
Reality: Many of the recent software
problems are caused by attackers sending attack codes embedded in image files,
such as photographs, to victims. The attack occurs when the victim is browsing
the Internet or reading an email and comes across a web page or a message
containing the contaminated photo: Upon viewing the photo, the attack code is
executed and infects the victim's computer with illegal activity software.
Myth 6: If I don't use Windows, I'm safe.
Belief: People who don't use Microsoft
Windows are safe. Criminals prey on Windows users because they are easier prey,
while leaving Linux and Mac users alone.
Fact: While Microsoft Windows users
are without a doubt the Internet users who receive the most attacks, people
using other operating systems or software are not immune from software flaws or
fraudulent attacks. Recent Mac virus cases, for example, show that choosing
other software is not enough to eliminate the risk of an online attack.
Furthermore, many of today's attacks, such as phishing, work regardless of the
software package being used.
No comments:
Post a Comment