The Internet offers many opportunities to its users. But it also has a dark side, that many users are unaware of, or chose to ignore. In Security 101, we discuss five aspects that ever Internet user needs to know to protect the computer, data, and identity online.
- In downloads, we discuss the dangers of downloading files from the Internet, and options to make sure the file downloads are safe before executing them on the local computer.
- In Privacy, we discuss privacy related topics like identity theft, and offer advise how to avoid it.
- In Phishing, we explain the concept, and provide the means to avoid phishing forever.
- In Spam, we detail how spammers find email addresses, and what you can do to protect your email from them.
- In Updates, we discuss the importance of keeping the computer system, and its software up to date to avoid leaving the system’s vulnerable to attackers.
Continue reading Security 101, What You Need To Know To Survive On The Internet
Here is a handy phishing flow chart that can help inexperienced computer users in analyzing potentially dangerous emails. Check out our how to identify phishing attacks guide for additional information and tips on phishing attacks.
The flow chart basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.
Continue reading The Phishing Flow Chart
Phishing is an attack form that is usually carried out by email. The term phishing is made up of the two words password and fishing which describes the basic concept. Attackers try to convince the user that the email has been send by a trusted organization. Most phishing emails fake emails from financial organizations like PayPal or banks but other services like social networking sites such as Facebook or MySpace are also targeted by phishers.
Links in those emails lead to fake websites that look like the original website. The only purpose of those fake websites is to catch the login data of the user who does not realize that the fake website is not the real one.
Continue reading How To Identify Phishing Attacks