Cyber
security isn’t just an issue for laptops and desktops. We get online on
everything from smartphones to tablets to gaming consoles. And we’re
often more lax about security on our mobile devices, putting them at
greater risk for cyber crime.
You know the basics – create unique passwords, stick to secure websites, et cetera, et cetera. But how much do you really know about cyber crime?
Online security is improving, but cyber criminals are getting smarter, too. Here are four new methods that cyber criminals are using to attack – and what you can do to keep yourself from becoming a target.
Mobile Devices
To combat mobile cyber crime, the Department of Homeland Security suggests taking the same precautions that you would on your computer. Password-protect your wireless network. Disable auto-login on your apps. Download and update mobile anti-virus software. And use caution when downloading files or clicking on links.
Phishing
Cyber criminals use phishing scams to trick unsuspecting Internet users into sharing sensitive information – like addresses, phone numbers, ID numbers and even banking information. Phishing scams can come in the form of websites, phone calls and, most commonly, email messages.Phishing emails may appear to be from legitimate sources – like your Internet provider, an anti-virus software company or a social media site. The email may ask for your information to correct an account issue, warn you that you have a virus, or inform you that you’ve won a prize.
Social Media
You probably think of social media as a fun way to pass the time or stay in touch with friends and family. But whether you’re on Facebook, Twitter, Instagram or any other social media site, it’s also an easy way for cyber criminals to gain access to your information.Social media sites encourage users to provide as much personal information as possible. They use it to target ads to individual users – but cyber criminals can use that same information to make you a target of their crimes.
Information commonly published on social media sites – like your name, birthdate, home town, address, and workplace – can be used to find out your passwords and even steal your identity. To stay protected, keep the personal information on your social media pages to a minimum – and only grant access to people you know and trust. Be sure to read the privacy policies on the sites you use regularly, so that you are aware of what information is visible.
Trojans
You might know the term “Trojan horse” from Greek mythology. As the story goes, the Greeks presented the Trojans with a peace offering of a giant wooden horse. But inside the horse were Greek soldiers, who promptly defeated the Trojans and captured the city of Troy.A Trojan horse in cyber-crime terms works the same way. A Trojan horse is malware that presents itself as a useful computer program in an email or on a website. You download the program, which then stays hidden in your computer to track your activities, download other malware, and launch attacks.
You can protect yourself against Trojan horses and other malware programs by avoiding suspicious websites and emails from unknown sources. Don’t click on links or download files you don’t trust 100%. You can also install anti-virus software that will scan the files you download and protect against viruses.
No comments:
Post a Comment