Tuesday, 7 July 2015

Ways to Protect Yourself from Hackers Online


ebay-cyber-attack-300x200An increase in cyber-attacks and identity theftmake the Internet seem like a scary place thesedays.
The hacking of Sony Pictures led the news forsome time. The U.S. State Department publicemail system was shut downEven the WhiteHouse was a target of cyber-attack.
There were reports of a billion dollar theft fromEuropean banks and secret viruses on millions ofcomputer systems across RussiaChina,India,Iran and elsewhere. This raises a question:
How can individuals protect or make it more difficult for hackers to access their information?
Here are tips that can help you protect against cyber-attacks:
1. Make your password harder to hack
Hard passwords include upper and lower case lettersnumbers and special charactersTheyshould be at least eight characters in lengthThey should also not spell out words easy forhackers to findlike your pet’s name or the name of a family member
2. Change your password regularly
very common mistake made by users is to create one hard password, but then never change it.Remembering a long list of complicated passwords can be difficult. But no password isunbreakableHackers are better able hack multiple accounts if those accounts all have the samepassword.  A password management servicelike Dashlane or PasswordBoxcan help youkeep track of hard passwordsThese services permit users to easily store and secure theirpasswords.
3. Clear your browser history
This goes for all the devices you use in a day – your home computeryour work computer, or yourfriend’s iPadInternet browsers like Firefox or Chrome keep track of where you’ve been and whatyou’ve done onlineThey keep records of every site you visitedInformation about what you sentfrom or saved on your computer can be kept for days or weeks. It is very easy for anyone whosees that information to steal a detailed record of your online activities.
4. Do not use free Wi-Fi
An increasing number of public places now offer free wireless access to the InternetOften, auser does not need a password to connect to these wireless networksThese services might beuseful, but they’re also an easy way for hackers to access everything on your deviceUnless youreally need it, it is best not to use it.
5. Use HTTPS
HTTPS is officially known as “hyper-text transfer protocol secure.” It is similar to HTTPwhich isused to enter Internet addressesHTTPS adds an extra layer of security and encryption whileonlineCommunications between users and sites that support HTTPS are encrypted. Theinformation is also authenticated. That means that HTTPS can determine whether or not a website is real.
6. Watch what you click
One of the most popular and successful ways hackers infect your computer is through atechnique called phishingPhishing occurs when someone opens an email attachment that looksreal. But the attachment is actually a virus that immediately infects the user’s computerIfsomeone sends you a file or a website you did not ask for, it is best to not click on it. 
7. Try not to use public computers
For many people, not using a public computer can be difficultThose without a computer orInternet access at home often use Internet cafes to get online.However, the more differentpeople use a computer, the more likely a virus has infected it.
8. Use anti-virus protection
There are many anti-virus services available for usersThey can offer many different types ofcomputer protection.  Some anti-virus services are even freeThey are a great way to have aprofessional help keep users one step ahead of hackers
9. Be careful while using thumb drive
Thumb drivesalso known as flash drives, are small and easy storage devices to use acrossdifferent computersThey are a popular device that people use to exchange files anddocumentsThey can also spread viruses easily across computers and networks.

Keep Your Computer Updated

10: Install, update and use anti-virus software
Installing antivirus software may sound like an obvious first step to protect against malware, but not everyone bothers to do it. With so many options now available, though, there really is no excuse. Microsoft offers its own free download in the form of Microsoft Security Essentials for Windows Vista and 7, while Windows 8/8.1 has Microsoft Defender built in.
Once installed, it’s vital to regularly update your anti-malware software’s database and run system scans at least once a month.
11. Keep Windows up to date
02b-Windows-Update-BT
Hackers often discover new ways to bypass Windows’ built-in security features, which is why Microsoft issues small operating system updates every Tuesday and larger ‘service pack’ updates once or twice a year. These will be downloaded and installed automatically by Windows update, but only if this feature is properly configured.
To check that it’s working normally, type Windows Update in the Start menu search box in Windows Vista/7, or at the Start screen in Windows 8/8.1. Look on the left of the Windows Update window and click Change settings and use the drop-down list to check that Install updates automatically is selected – anything other than this risks a crucial update being missed.
12. Turn on the Windows firewall, if anti-virus does not do it
03-Windows-firewall-bt
Windows has a built-in ‘firewall’ that protects your PC from unwanted attention via the internet. This software firewall is enabled by default and works alongside any hardware firewall that’s built into your home broadband router. Check its settings by typing “check firewall” in the Start menu search box or on the Windows 8 Start screen and choosing Check firewall status from the results.
Two green tick marks mean the firewall is working normally, else you’ll need to selectTurn Windows Firewall on or off on the left of the window and enable one or both options that appear.
13. Use the latest version of your web browser
Web browsers are vital applications, but just like other software, they can contain bugs. Hackers are quick to capitalise on these and create bogus (or infect genuine) web sites with data designed to exploit them. Once a web browser has been compromised in this way, a hacker can monitor everything you type, including passwords to credit card numbers. That’s why it’s vital to use the latest version of your web browser – anything other than this may be a security risk.
Microsoft includes updates for Internet Explorer. Search for Windows Update and check itsoptional updates section to ensure you’re also using the latest version of the application – which is Internet Explorer 11, if you’re using Windows Vista, 7 or 8/8.1.
Google Chrome and Mozilla Firefox will also update themselves automatically, but don’t ignore their requests to restart the browser when such an update has been downloaded and is ready to be installed.
14. Don’t fall for phishing emails
05-Phishing-BT
Emails that appear to be from a recognisable online service asking you to log into a site to confirm some personal details are always fake.
These emails are usually caught by your email application’s spam filter, but if one does slip through and you click its link, your web browser should detect and block the site it takes you to.
This does depend on your web browser being aware of the fraudulent site, though, which is another good reason to always use the most recent version.
15. Use the Windows Malicious Software Removal Tool
06-Malicious-tool.-bt
If you suspect your PC has succumbed to malware and your anti-malware software doesn’t detect it, there are two steps to take.
The first is to download and run the Microsoft Malicious Software Removal Tool from theWindows Download Centre. This will detect and remove specific types of malware and is very simple to use, although it isn’t a replacement for a full anti-malware application.
16. Still infected? Use a boot CD.
07-Kaspersky-BT
Some malware can hide within Windows and make itself difficult to detect and remove. If your own anti-malware software and the Windows Malicious Software Removal Tool fail to shift it, you’ll need to download and burn a free anti-malware boot CD – refer to your computer’s manuals for instructions on how to boot from a CD as the process varies from manufacturer to manufacturer.
Kaspersky Rescue Disk 10 is a good one, but never download it on an infected PC -ask a friend to do it, if necessary. This will then scan your PC for malware without the need for Windows, which makes removal that much easier.

No comments:

Post a Comment