The-EN.com

Would you like to react to this message? Create an account in a few clicks or log in to continue.

Welcome to The-EN Community!
Please welcome our newest member: https://electronicnetwork.all-up.com/u460
Discuss & Discover more.

2 posters

    Top Five Cyber Security Myths

    SPADEZ
    SPADEZ
    EN Administrator
    EN Administrator


    PSN ID PSN ID : SPADERZ216

    Gender : Male
    Join date : 2010-06-18
    Posts : 2407
    Cash : 32285
    Location : N-Y-C
    Puerto Rico

    Sticky Top Five Cyber Security Myths

    Post by SPADEZ Sun Aug 01, 2010 6:17 pm

    Security is one of the most important factors that could ensure our privacy rights. Indeed it's not a novelty that cyber criminality is a contemporary concern of society. Therefore it is highly recommended to know the top five cyber security myths offered by professionals.


    Cyber Security Basics

    The notorious scandals as well as unfortunate personal experience induced people in a constant state of doubt when it comes of revealing private data on the internet. This is in fact one of the main business tricks of the media who would question the security and basic conditions of various companies in order to find the best story and launch a real craze among the public. Professionals however stick to their intention to provide us with the latest and top five cyber security myths that though can be easily busted would still cause some moral and also financial damages to people. These would also reveal some of the most well-known tricks cyber criminals use to convince people to offer their personal information. Though some of the might seem familiar for the majority of frequent internet and social network users, however some were also kept in secret for a long time and were revealed just recently. Enrich your knowledge of security especially if you are a real rookie in this domain.
    Cyber Security Myths




    Myth No.1: Having Firewall Equals Safety
    # Though it was echoed several time that having a firewall would be enough to protect us from any harm, it turns out that this statement is not 100% true.


    # Undoubtedly it requires additional justifications, namely that this is in fact a real gate to the outer world. This might have endless benefits still it is also used by hackers in order to invade your privacy and take advantage of your vulnerability.


    # Security can't be guaranteed by the producers of these programs since finding the weak point of a similar shield won't give any headaches to professional hackers.

    * Cyber Security

    # Therefore it is important to know not only where we head when crossing the firewall but also what might enter our system.




    Myth No.2.: An E-mail From a Friend is Safe
    # Hackers as well as potential criminals often use the 'address' list in order to send spams as well as attacks that can weaken and in more severe cases destroy our computer. Those who are specialized in security issues are aware of the fact that e-mails can come from endless sources that are either traceable or completely untraceable. Therefore think about getting letter from people you don't know or senders you didn't contacted. Keep away of opening these especially if you have experiences similar disasters. Often the tragedy can't be avoided since most of the skilled hackers are aware that disguising themselves in relatives and friends is the ultimate solution to invade one's privacy.




    Myth No.3: Links From Twitter and Facebook are Safe
    # It is a common misconception that the link provided by friends on social networking sites is safe and secure. However with the development of technology hackers and attackers also specialized in targeting these centers of users that often suggest security and people tend to reveal their personal information. Hiding behind the mask of a friend can be the best means to send spams as well as scams. With the use of XXS or cross-site scripting these criminals copycat the applications creating the alter ego of your favorite Facebook or Twitter site.

    * Cyber Protection




    Myth No.4: Hackers Target Financial Transaction
    # Those who don't do any business operations on the internet might feel themselves safe from the attacks of hackers. However it seems that 'property' is quite a wide concept. Lately intellectual data theft is more common than the well-known financial damages.


    # There's no need to have your credit card information to be deprived of important properties. Instead think about great companies who store and exchange their knowledge as well as plans and objectives with their partners, which can be easily stolen by pro hackers.


    # The world leading companies can suffer extreme damages if their secret plans and business initiatives will be revealed used for personal interests.


    Myth No.5: Messages are Safe, Attachments are Dangerous
    # Professionals also warn us of the harm individual messages can do to our operation system. Some would think that reading those few words can't do us any damage, instead clicking on the attachments is the real triggering factor of tragedies. This is partially true, however it must be also mentioned that hackers are able to create real harmful messages without the need of any click of users. These e-mails are dangerous enough to do any harm due to their threatening content.
    Vicky
    Vicky
    EN Elite
    EN Elite


    EN Award#1 Top Poster

    Join date : 2010-06-24
    Posts : 3404
    Cash : 27158
    Location : Vocaloid
    Japan

    Sticky Re: Top Five Cyber Security Myths

    Post by Vicky Sun Aug 01, 2010 6:34 pm

    Yeah this way be careful info you put out on internet

      Current date/time is Thu Nov 21, 2024 8:06 pm