Internet Security – 4 Current Risks

Phishing

The concept of phishing must be heard in the context of internet security. It’s the way someone does faithfully mimics the official website or e-mail communication between banking institutions or other important services. Typically, an attacker sends out an e-mail message with credible content, an official logo, and an overall probable message template.

The warning signal should sound in your head when the message calls for entering your sensitive data (name and surname, username, password, or even PIN or card number). With a click from this email, you can even be redirected to websites that look genuine, literally and literally.

How not to fly?

  • Make sure you never enter anything in email forms. Never.
  • Take a look at the sender’s e-mail address, which may also be special on closer inspection.
  • If you come to a webpage via a click from an email, look in the header for its address. You really are on the official site?
  • Open the official website of the institution from which you think the e-mail came. Are these two pages really the same? And isn’t it already written on the official website that fraudulent e-mails have just appeared?
  • Enter part of the text of the email into your search engine, you may find that someone has already reported this fraudulent email.
  • If there is an attachment in the e-mail, scan it with an antivirus. Under no circumstances open .exe files.

And the main thing is simple tool: The bank has no reason to send e-mails with links to the confidential information form!

Hoaxy

Hoax in translation means fake news, mystification or a journalistic duck. Simply and simply, something that isn’t really true is a fictional story, but it’s elaborate, and it’s intended for us to believe it.

Hoax often plays on emotions and faces are very important. Requests for urgent help are typical (eg for a sick little girl) or provide shocking information (eg chipping people when testing for coronavirus). The report looks like a leak of very confidential information from important institutions, and you are very lucky to have received this information or it refers to relatively credible sources, which can be the FBI, WHO. A hint that this is a hoax could tell you the end of the message asking for another email.

Hoaxes do not only have to be spread by e-mail, but also messages in WhatsApp or Facebook are known. Currently, the Covid-19 theme is quite “in” in this regard. Although hoax is not as harmful as phishing when it comes to just forwarding a message, some hoaxes contain calls for payment.

Whenever you get an unusual message, even from someone you know well, give it a try enter the subject of the e-mail into the search engine. You may find that a hoax landed in your inbox, which is only worth deleting or ignoring. You can also use special websites that deal with hoaxes. Czech is e.g. hoax.cz.

Online hazard

Risk also lurks in the world of gambling. And by that we don’t just mean the usual player risk that comes with the possibility of losing. There are foreign online casinos that look trustworthy but are fraudulent. If you win you your winnings will not pay off. In other cases, only your personal data and input deposits to the game lure you.

This risk can be avoided. The Ministry of Finance has introduced casino licensing as part of gambling control. There are currently seven legal online casinos in the Czech Republic. You can find an overview of them, for example, at this page. All these legal casinos must meet strict conditions, such as having at least EUR 2 000 000 of own resources, which come from transparent and sound activities, and a deposit to guarantee that the winnings will be paid to the players.

At the same time, the Ministry of Finance administers list of illegal internet games, where it explicitly names casinos whose operation is prohibited in our country. In such a case, it obliges connection providers to block access to these websites.

The law also refers to the fight against gambling addiction. Therefore, it includes mandatory breaks in games in licensed Czech online casinos. If a player plays without a break for 2 hours, he is prohibited from playing for 15 minutes.

Cyberbullying

The risk, which has been much mentioned lately and from which parents’ hair rises with horror on their heads, is related to children. This is cyberbullying, tracking sites with pornographic or racist content. It is possible within the computer settings turn on parental filtersthat unauthorized pages children don’t see. There are applications and antiviruses that help with this content control, but the world of the Internet is dynamic and always one step ahead of security measures.

The risk is also related to what children voluntarily share on the Internet. In good faith when discussing with classmates, a child can provide a photo or information that will drive him into a corner and lead to bullying. But it doesn’t have to be just about classmates, but also about completely unknown peoplewho pretend to be a ten-year-old girl, for example. Creating a fake Facebook account is a matter of moments. Take a look at, for example movie In the network. The main thing to prevent is to talk to your children about these risks.

For Internet security, among other things, you have to use your head, engage your brain, and don’t be manipulated or emotionally blackmailed. If you realize your mistake, don’t make trouble for yourself. In most cases, the case is so serious that it makes sense to contact the police.


Source: Diit.cz by diit.cz.

*The article has been translated based on the content of Diit.cz by diit.cz. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!