Gadget and you are on vacation. How to use the internet safely while traveling

If you go to the post office, you can see a number of people politely standing in line (not just pensioners), holding forms of rent, electricity or telephone.

Meanwhile, electronic bank payments can be used today. Just remember a few rules.

Follow a few basic safety rules and you'll get even more comfort and peace of mind.

First, protect your computer by using electronic banking services.

Set it to legal software, antivirus and firewall. Legitimacy is highly valued.

Pirated software does not provide you with proper updates, and may also be created by criminals and contain harmful viruses.

If they infect your computer, their software can take over your confidential information.

Antivirus programs and firewalls should also not be taken from unknown sources.

It is in your interest to update them constantly. Each a new version better prepared to protect your computer from attacks and malware.

Do not use the same password for all sites. Please make sure you enter the correct URL or web address when you enter the site.

Be careful, sometimes a small typo can redirect you to a malicious resource.

Make sure your connection is encrypted. A sign of this is when the web address starts with HTTPS:// and a closed padlock icon.

Avoid places with computers that are accessible by more than one person (such as Internet cafes) and unsecured Wi-Fi networks.

In order to protect your data, clear the cache - whenever you use an electronic bank on a computer, do not forget to log out of your account, because your login data may be stored across browser sessions.

Not for every address Email worth answering. This may be a phishing attempt, so ignore these messages and beware of clicking on the active hyperlink it contains.

Online shopping is usually cheaper, faster and more convenient way to buy. However, in order to be safe, use the services of reliable online stores.

According to various estimates, about 1/3 of Internet users currently use Internet banking.

Considering that approximately half of the population has access to the network, it can be assumed that 15-20% of people use transactional services. This is surprisingly small.

However, it is popular to pay bills at the post office, supermarkets or shops.

Payments at the same time occur alone, but apparently, many are worried about security.

Young people are better educated and use online banking more.

One of the exceptions are entrepreneurs who are looking for ways to reduce costs, in droves, regardless of age, and are switching to electronic banking.

Most of all, people are afraid of leaking login, password and fake web pages of banks.

Recently, the media has also given e-payers a big scare.

Some banks do not set transaction limits, making it easy to clean up an account after a credit card is stolen.

This problem also has an Internet connection aspect. In banking sites, contactless payments are often not registered at all until they are finally settled.

Therefore, it is difficult for users to quickly respond to suspicious transactions. Good luck.

With the advent of bank plastic cards, everyday life has become much easier. With the help of modern banking technologies, you can easily pay utility bills, book a plane or train ticket, and purchase something in online stores.

People no longer have to stand in endless queues for utility bills, theater tickets or train tickets. Everything has become much faster and more convenient. But has it become safer?

What is the danger of online payments?

Each owner of a plastic card should be aware that every time a purchase is made with a bank card, all information is sent to the bank. There it is checked for authenticity. If the verification is successful, the bank will transfer the funds to the seller's account and the purchase will be completed.

Attackers always strive to collect as much data as possible about the card (its number, expiration date) and its owner. Then they pay for their purchases via the Internet at the expense of the unsuspecting cardholder or transfer funds to their personal account.

What is a phishing site?

This term "phishing" comes from two combined English words "fishing" - fishing or fishing, catching fish and "password" - password. It is this word that is called the most popular and common method with bank plastic cards on the Internet. Its purpose is to fraudulently obtain as much of the cardholder's identity as possible. Fraudsters seek to “catch” the card and account number, login and password of the owner from the Internet.

Fraudsters create a fake site (so-called phishing site) that appearance and content resembles the official page of a bank or other financial organization that also conducts financial operations, for example, WebMoney. In order for cardholders to give out theirs, attackers arrange a spam attack, send threatening letters if cardholders do not confirm their data.

Fraudsters today have in stock contented cunning and sophisticated ways to fish out information. They come up with good reasons why bank customers should provide all the information they need about their funds and card.

The most common reason is that an urgent data check is needed due to a system failure, a hacker protection system being installed, or data being lost. Letters with such content, as a rule, attach a link to a “fake” site where data of gullible citizens is collected and which will be used in illegal actions of malefactors. An example of such a letter.

How to protect yourself from scammers?

To protect yourself and your money from encroachments of scammers, you need to take a number of necessary measures:

1) Do not keep all your money or a very large amount on one bank plastic card. You can calculate a certain limit for yourself, and put the rest of the money into a completely different account that will not be associated with the card.

2) The SMS notification service is useful, which can be connected at the bank or independently through the Internet bank, if you have it connected. By setting the SMS notification function for yourself, you will receive in a timely manner all the information about transactions made with your card (for example, transfer or withdrawal of funds, payment for purchases).

If you received a notification about an operation unknown to you, it means that your card was used illegally. You should immediately contact the bank and report the problem, freeze all transactions carried out with the card, and simply block it.

3) Apply for a regular account statement. It is too effective method find out if you are a victim of fraud or banking failures payment system.

4) If you are going to use the services of an online store, choose only trusted and reliable sites and companies. If you have doubts about the honesty and reliability of the company, it is better to use WebMoney or Yandex.Money payment systems. You can replenish your e-wallet with only the amount necessary for the purchase, and then use it to pay for your purchase.

5) Never use your bank plastic card from a shared computer in public places, such as Internet shops or cafes.

6) Now many banks are releasing a new service - specially designed for online payments. Using this service, the client receives the necessary details, as well as an account linked to a virtual card, where you can deposit or transfer funds necessary to make an online purchase and use its details. So scammers will not be able to get to your money, and even if this happens, they will receive only a small part that was transferred to virtual card. Also, these cards have a different validity period, which also allows you to provide decent protection for all payments made.

7) And remember, to protect yourself from fraudulent activities, never share your security pin code with anyone. bank card.

Also, do not forget that bank employees will not ask their customers to provide or remind them again of their personal data (pin code, CVV2 or CVC2). This information is known only to you.

8) Do not click on links or pop-ups, or use attachments from incomprehensible resources. Be careful before submitting your details, as often the domain or website URL provided by the scammers is incorrect. Be vigilant and save your money!

P.S. It's also helpful to take a look.

The magical time of the New Year holidays is approaching, which means it's time to travel.

The modern user wants to be in touch everywhere and 24 hours a day. Travel is not a reason to refuse constant communication. Just the opposite. When traveling, users are increasingly using their gadgets in a variety of situations - from finding information about attractions to paying for air tickets. But what dangers might lie in wait for them? And how to protect tourists active in the Internet space and their gadgets while traveling? AiF.ru asked the specialists of Kaspersky Lab about this.

Internet on the go. Is it safe?

According to statistics, many literally do not let go of their gadgets - smartphones, tablets, laptops. Moreover, they do not part with them even when traveling - after all, with their help, you can publish photos on social networks, check in, write statuses and keep abreast of all events. 50% of users actively use the Internet in public transport, 44% connect it in their car, 70% press the buttons right in bed, barely waking up.

If we take into account the fact that many of them store important confidential information on personal devices, the loss of which can lead to significant financial troubles, then we can understand why such users are of great interest to hackers.

Paradoxically, but few of the users, storing important data on their devices, think about their security. Although hackers can easily intercept data and passwords, only 27% limit their activity and perform only safe actions when using open networks. These are the statistics of Kaspersky Lab.

Most users are not so vigilant - for example, 17% register on sites and log into their accounts, and 4% even make purchases or banking transactions in open networks. At the same time, gadgets that are often connected to public open wifi networks.

Insecure connection. How to protect your data when using open Wi-Fi?

There are some fairly simple rules that will allow you to keep personal information confidential when using open WiFi hotspots in cafes, hotels, airports and other public places.

So, for example, you should not unconditionally trust those networks that you can immediately enter and start working on the Internet without any passwords. Such Wi-Fi connections, as a rule, are now provided in all shopping centers, clubs, cinemas and even transport.

Moreover, if you see that the network asks for a password, you should also be vigilant. Fraudsters can find out the password to the network, for example, in a coffee shop, and then create a fake connection with the same password. This makes it easy to steal the personal data of a person. In this case, you should trust only those network names and passwords that are provided to you by employees of this institution.

To be on the safe side, turn off wifi connection when you are not using it. It will also save battery power. Experts also advise disabling the automatic connection to existing Wi-Fi connections.

In the event that you are not 100% sure of the security of the wireless network, but at the same time you still need to go online, try to get by simple actions e.g. checking email, reading social networks. But in such a situation, you should not make any transactions in the online bank or enter your confidential data anywhere (bank card number and especially the CVV code).

Some social networks require manual setting security. In order not to worry about potential attacks by cyber scammers, it is enough to enable the item “Always use secure connection» (HTTPS). It is recommended to enable this feature when visiting all services that you are not sure about the proper protection.

If possible, you should use a virtual private network (VPN) connection. This great option data protection, the only thing is that it is not free. Traffic in such a network is routed through a secure tunnel in encrypted form.

Be sure to use specialized complex tools antivirus protection. They warn of potential danger if you connect to a questionable WiFi networks, and will not allow passwords to be transferred if there is a threat of leakage.

How to prepare your gadget for vacation?

In order to protect yourself to the maximum on vacation, you should prepare your device for the trip.

So, it is advisable to set a PIN code on all your devices. Blocking will save you from unauthorized access to your data, as well as just from prying eyes.

In addition, it is advisable to install a program to track the location of the device and block it in case of loss or theft of the device. For example, the Anti-theft feature in Kaspersky internet security for Android will allow you, if you lost your phone, to remotely turn on the siren on it. In addition, you can track the location of the device on the map, block it and take a photo of whoever has it. In extreme cases, you can even remotely clear the device's memory. So, at least, photos and contacts will not fall into the wrong hands.

Also, train yourself in advance not to share sensitive data while connected to public Wi-Fi networks.

Be sure to update the software for your device before you travel and do backups all files. And put a pop-up blocker in your browser.

Additionally, you should worry about the security of other devices and devices that you take with you and that can be synchronized with a mobile device. Install complex antivirus for smartphones and tablets on Android, as well as for laptops on Windows and Mac.

How I safely visit ANY websites and run virus-infected programs without infecting my PC. Do not use Internet Explorer.

  • How to safely use keygens (even if they are with Trojans)? - by running them in a virtual machine or in Sandboxie (paid, but there is a trial)!
  • How to use different software without installing it on your computer? How to check your PC with another (two, three) antivirus?
  • How to safely download using torrent programs? How to safely download from a hacker site (only a visit to which should have infected your PC) and get away with it, then you are welcome to read this article to the end.

Once you get to know the Virtualbox program, you will agree that it has a lot of useful features, so I now call it Pandora's chest (for greedy software producers).

How to safely use keygens.

I will make a reservation right away. Some keygens hack the program during operation - they need “body contact” and they are launched in a virtual machine only to hack the software that you install in this same virtual machine. Others, by date and other data, select the code and give it to us. These can be run in a virtual machine, and the software can be installed on your PC. What is this all for? The fact is that some cracks at the same time as hacking software put a Trojan. Which one of them will do it "by the face" cannot be determined, therefore, for safe use keygens, it's good to isolate them all in a virtual machine. And I heard that sometimes antiviruses on a keygen that DOES NOT put a trojan say - TROJAN! That is why it is not always easy to figure out which of the cracks is with the Trojan and which is without.

How to use a bunch of software without installing it on your PC?

Putting it in a virtual machine! In total - we have that some of the cracks are installed by Trojans. So let these trojans live in a virtual machine ... Of course, putting games there is not always good. For example, Starcraft 2 and similar monsters cannot be played in a virtual machine. Although in Diablo 2 you can. Any photoshop there is quite possible to put there. You can then send pictures to yourself by mail. Shared Folders with such an infected machine it is better not to do it. But it's easier to put a trial Photoshop, right offsite - using the eternal trial technology. Which for Photoshop has some differences. Here's Photoshop for free! And how to scan your computer from Virtualbox with another antivirus.< И наконец, как защититься от интернет вирусов и хакерских сайтов? Как безопасно качать по торрент протоколу?

You already understood that by installing Ubuntu OS in a virtual machine, we can organize a secure Internet. Most dangerous sites work like this. When your browser visits the site, it downloads HDD files. in the temp folder. And if among them there is a virus, then here is the infection for you. Or, Windows vulnerabilities that have not yet been closed by updates are used. Or some other way. I offer two options for how to use the Internet safely.

  • Visit not the sites themselves, but their copy stored in the cache of Yandex, Google. There are no internet threats and no internet viruses. Pay attention to the reputation of WOT. ATTENTION! The swindlers are already doing such a feint - by creating 50 false accounts in WOT, they turn the color of the icon green, through fake votes. But if you go to the reviews about the site, you will see the statements of real people (and not really - they give themselves overly loud praises to the site). This will help you get an idea of ​​the site.

  • Visit sites through proxy servers. For example http://www.4proxy.de/ , http://biglu.ru/ - malicious scripts are not designed to "pierce" a PC sitting behind a "powerful back" of a proxy server. A large collection of such "convenient" proxies is opened on the 2ip.ru website in the Anonymizer section.

  • If the above options are not suitable, visit sites whose content may contain Internet threats using a virtual machine. The same method is needed for secure torrent downloads.

A method for safely visiting web pages and downloading files using the torrent protocol.

When downloading a torrent, the program receives a list of participants. Those. the IP and operating system versions of those who exchange files are known. All participants - and hackers too. Next is the matter of technology. Using the IP address, which is clearly visible in the torrent downloader window, we scan the ports and attack the user's PC. The result - the file is uploaded and a trojan is installed as a gift.

If we go to such a site from virtual machine, in which another operating system, then hacking will either not happen (more often such sites are designed for Windows users), or Ubuntu will be hacked. Which is not very critical. Why? Because the order of using such a virtual machine, for safe internet surf looks like this.

  1. Install Virualbox on your PC.
  2. Turn off the Ubuntu virtual machine and copy the virtual hard disk from drive C to drive D.
  3. We download torrents inside the virtual machine, and then upload them from the virtual machine to ex.ua or Yandex disk. Then we turn off the virtual machine and calmly download the files using the more secure http protocol.
  4. After an intensive search for something like that on the Internet, having copied all the necessary data from the virtual machine to our hard disk, we replace the virtual disk with Ubuntu installed with a clean copy from disk D.

And our dearest Windows will remain intact.



Loading...
Top