How to Protect Your Identity, Personal Data and Property

How to Protect Your Identity

Between malware, botnets, viruses, worms, ransomware and DDoS attacks, it may seem impossible to protect yourself online. The trick is to stay abreast of all the latest threats and to know what to do when the worst happens. That's why we've created this page as a one-stop shop to safely protect your data and privacy. We're going to keep changing and expanding this page, so please use the comments to let us know what you'd like to see — and don't be afraid to hit us up with any security questions you may have.

— A spate of malicious browser extensions have been plaguing Google Chrome. Some are designed to steal personal data; others use your computer’s processors to "mine" cryptocurrencies such as bitcoin; others inject ads into browser pages. Google has removed most, but not all, from the Chrome Web Store. ADVICE: Check which extensions you have by clicking the three vertical dots at the right end of the Chrome toolbar, scrolling down to More Tools and clicking Extensions. Delete anything you don't recognize. — A well-known banking Trojan is using a new method to spread. Its creators are silently hijacking web pages, inserting links to their malware, and adding hidden keywords to the infected pages to boost their Google search results. ADVICE: Install and run antivirus software, which should stop the banking Trojan. — If you have a WordPress blog or other kind of website, a new flaw might let hackers take over the page. ADVICE: Patch WordPress to version 4.8.3.

Tech-support scams: These usually come as random phone calls from technicians claiming to represent Microsoft or "Windows." They'll say there's something wrong with your computer, and that you need to install software so that they can get remote access to it. Advice: Hang up. Fake IRS/police scams: These are phone calls or text messages from people who claim you've broken the law or owe back taxes. They'll say you face immediate arrest unless you pay a fine, often via Western Union or a similar service. Advice: Ignore them and report any such calls to the real police. Fake antivirus: These mostly arrive as pop-up messages in a web browser. They'll say your computer is infected, and that you need to purchase and install an antivirus product immediately. Advice: Don't do it — the products are almost always bogus, and some might actually be malicious.

Security Terms You Need to Know Banking Trojan: Malware designed to break into online bank accounts. Banking Trojans often infect web browsers, then lie in wait until the user logs into an online bank account. The end goal is to transfer money from your account into accounts controlled by cybercriminals. Botnet: A network of otherwise unaffiliated machines running malware that has them working together on particular tasks. It puts the infected machines — often thousands at a time — to work cracking passwords, sending out spam or distributed denial-of-service attacks.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Massive Data Leak Hits French Submarine Firm

2 Sep, 2016

Authorities in India are investigating a massive data leak that has exposed sensitive information relating to a fleet of new …

Read more

Reaching the data gold standard: dream or reality?

10 Nov, 2021

On the face of it, the concept of businesses bringing structured and unstructured data together through technology to surface new …

Read more

Medical devices: Many benefits, but many insecurities

4 Oct, 2016

In the world of medical device security, success comes down to having the capability to fail gracefully. This is not …

Read more

Recent Jobs

Senior Cloud Engineer (AWS, Snowflake)

Remote (United States (Nationwide))

9 May, 2024

Read More

IT Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Data Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Applications Developer

Washington D.C., DC, USA

1 May, 2024

Read More

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.