Information & Technology | 8 Years of Autodidact Experience |
Developer | Server Admin | Non-profit Organization
Security and privacy on the internet
As the new technology arise, so are the possibilities of hardware and software, being connected with everyone online has become part of our routine, perhaps the internet came as a service with risks to manages included.
We would all love having a completely private and secure experience online; In order to get closer to this, we have to understand that the internet is not perfect.
[Source: fbi.gov] In 2019 only in USA, there have been 3.5 Billion dollars USD stolen from the citizens by cybercrimes, however Including all the efforts realized by the justice to help the victims, only 300 million dollars have been recovered to them.
That may seems like a lot but it means that only about 8.57% of the amounth stolen by fraudsters, identity theft and other cybercrimes, is been refunded.
The purpose of our website is to provide insightful informations that helps you and others to protect yourself online.
The most common
online scam
Phishing Emails
Fraudulentemailsimpersonating company and using manipulation technique in order to trick an intendedvictiminto visiting a fraudulent websitedisguised to look like a valid eCommerce or banking site. TheVictimthinks they are logging into their real account, but instead, everything they enter on the fake websiteis being sent to thescammers. Armed with this information, thescammercan wipe out thevictim'saccounts, run up their credit cards, and even steal theiridentity.
Anti fraud guide & Tips to protect your identity online
5 TIPS for avoiding cybercrimes
Avoid telling personal information over the phone or emails
Choose privacy-focused service providers and reputed anti-malware.
Make your online purchase with Paypal or by Credit card if possible as it came with fraud insurance.
Know that it is possible to impersonate any phone number including the shown name. Call back to see if it is real - don't feel bad saying that you will call back if is important info.
Never enter your Credit Card or personal details on an HTTP website — HTTPS has been implemented for encrypting information traveling on a website to prevent other users from reading your datas.
11 Bonus Tips
Verify the refund policy of the website and the seller prior to buy or made a payment.
Know that the police can't recover funds for you in most cases.
Be aware of hacker pretending to be able to recover funds for you, these are the lowest kind of scammers as they only target vicitms of scam.. also hacking is illegal.
Interact transaction are not refundable even if it is a scam but the police can investigate and make a criminal record to the person (if they identify them).
Encrypt your entire hardrive to protect it from physical attack.
Encrypt your sensible files (Recommend using Encrypto) so that once your hardrive is decrypted, your files succeptible of being encrypted by a scammers for a ransom, can't be as they are already encrypted (can't encrypt files twice). It is also a lot more private for you.
For privacy reason, don't enter your facebook email anywhere if you don't want facebook to identify you on other websites.
Read our article on Romance Scams as they are in rise!
And please, don't wait until you get scammed before learning about fraud prevention.. stupidy is more popular on youtube then fraud prevention sadly but it is definitely a better times investment!
Know that some government with bad intentions have access to Pegasus spying software and that there have been official case of abuse and only a phone call is enought to hack your phone.
By default, the UPnP (Universal Plug & Play) feature is enabled on most routers, posing a well-known vulnerability that impacts approximately 90% of Internet users.
Additionally, many routers come with the same default password across models of the same brand. It’s crucial to change this password to prevent unauthorized access to your router.
Computers are designed to give users control over certain security settings, such as the ability to approve or deny remote connection attempts. Your online security largely depends on your ability to recognize threats, respond appropriately, and adopt safe online habits.
While there’s no need to be overly cautious, understanding where threats originate from can significantly help in mitigating risks.