There are always reports in the media about malware and threats from the Internet that cripple individual computers or infiltrate entire networks. From such incidents are both Private individuals as well as companies and authorities affected. The range of dangers on the Internet is now very wide and good protection is essential.
The reasons for infecting computers are manifold. Most of the time, these are hackers who either personal data collect or, in bad cases, extort money from you. Another possibility is to target your computer remotely and add it to a botnet.
However, these Internet threats do not necessarily have to affect your own PC. Because with the help of a few simple rules as well as the appropriate Internet Security Software can be used to reliably protect computers from viruses and other threats. Protect. mysoftware.de shows how this works.
Dangers on the Internet | All topics at a glance
You might also be interested in
Dangers on the Internet | All topics at a glance
You might also be interested in
Data theft through phishing
Phishing is not so much malicious software. In fact, it refers to a process to send Account data or access data to get to the site. Phishing usually takes place on social media or via email. The procedure is often similar: The hackers send deceptively genuine-looking e-mails from large companies or banks and ask you to log into your account as quickly as possible. The reason for the letter: unpaid bills or important customer information. In fact, the link leads to an identically replicated page that has nothing to do with the company and is controlled by the attackers. They can easily read the entered data and use it for their purposes.
Attentive behavior on the Internet offers good protection against phishing.
What types of phishing are there?
In general, there are all kinds of the well-known and dreaded phishing. Roughly speaking, the intention of those who set up and spread the traps differs:
phishing to obtain credentials or passwords in order to gain access to accounts.
Phishing to steal credit card information, online banking details, etc.
phishing to infect computers and otherwise spread malware on the Internet.
Phishing by Man-in-the-middle method, where the data is tapped without an intermediate site.
Phishing to obtain access data or passwords in order to gain access to accounts.
Phishing for stealing credit card information, online banking data, etc.
phishing to infect computers and otherwise spread malware on the Internet.
phishing through the Man-in-the-middle method, where data is tapped without an intermediate page.
The procedure is very similar at all times. Case study:
The user receives a supposedly secure e-mail from his bank. The familiar appearance suggests to him that he is following a trusted link (a shortcut). The mail contains a notice that a password change is necessary for security purposes. If the user follows this link, he actually – or apparently – ends up on the bank’s page and is asked for the login data.
The entered data ends up directly with the fraudsters, who can do all kinds of damage with it.
The example of online banking is freely chosen, but very popular for phishing. Other targets often picked up in phishing include:
Amazon, PayPal and eBay accounts
Access data from Facebook, Twitter, Google+ and other social networks
Logins from messengers such as Skype
Access data from web storage like Dropbox
Amazon, PayPal and eBay accounts
Access data from Facebook, Twitter, Google+ and other social networks
Logins from messengers like Skype
Access data from web storage like Dropbox
How phishing attacks give themselves away?
In most cases, phishing traps give themselves away by the fact that they have to appeal to a broad mass and are not personalized enough for a user to act on them. For example, mails with included links are sent by people the recipient does not know. Such links almost always contain phishing content that targets the recipient’s data.
Things become much more difficult when you receive supposed mailings from your bank or an online portal. These mails appear genuine as the technique enables attackers to fool your mail program into thinking they have an authentic e-mail address. In this case, there must always be a check of the linked domain (Internet address). At the latest in the browser it becomes clear that it is not the bank or any other trustworthy provider at all. Even the SSL certificate as a security are used. However, it cannot be ruled out that this has also been very authentically recreated.
How to protect yourself from phishing?
The best protection against phishing is attention. If you browse the Internet completely unconcerned, sooner or later you will end up on a criminal website. Malicious links lurk in e-mails as well as in forums or on websites you don’t really expect it from. Therefore, links should always be critically examined and not immediately assumed to be trustworthy.
If sophisticated systems such as Trojan horses are used for phishing, caution alone is no longer enough. Here modern protective measures needed in the form of software that enables secure browsing as well as a verification of the actual server connection. The so-called Internet security comes in all sorts of forms. In most cases, e-mail attachments and links are also checked, so that the user is alerted to this before the actual attack and can cancel the process.