WAYS TO PROTECT YOURSELF ONLINE

1. Download Files or Software with Caution

If you get an email with an attachment and don’t recognize the address, don’t open the email and don’t reply. Hackers and identity thieves can send malware, which is software that installs viruses, spyware, or provides hackers easy access to your information and computer, as an email attachment.

Be suspicious of banks asking for your information via email (banks never ask for personal information over email), and as a general rule, even if you think the sender might be valid, don’t send out personal information, e.g. social security number, bank account number, etc. over email.

“Even the best security software in the world won’t protect you if email a scammer personal information,” said Leach. “Before you reply, just stop and think.” Similarly, don’t download software from websites that aren’t reputable; know what you’re downloading and where it’s from. Downloading iTunes from Apple.com, for example, is safe. Apple is a well-known corporation and iTunes is a common download, so it’s highly unlikely there’s any malware attached to that download.



The website download.cnet.com has a database of thousands of generally safe software downloads, a good way to gauge how safe these downloads are is to take a look at how many downloads of the software there have been. The more downloads, the more likely it is that the download is safe.

Hopefully, by following those tips, you won’t have to worry about disputing charges. Of course, in the era of the Internet, there’s no foolproof protection against cyber crime, but if we become smart and careful consumers, we can reduce the risk and loss of money that so many people have already suffered.


2. Keep Security Software Up-To-Date

Old security software or, worse yet, non-existent software won’t do you any good. Jennifer Leach, who manages the OnGuard Online website for the Federal Trade Commission (onguardonline.gov), advises new computer buyers to also buy security software, and then, “make sure it is up-to-date and active. Don’t assume that the new computer you have has any security turned on at all.” That means you should run updates any time your antivirus
software prompts you to, and check that your firewall is on.

A firewall is just what it sounds like: a wall put up between the software of your computer and the greater world of networked computers. When they’re turned on, firewalls block unauthorized access to your computer while still letting authorized communication through. This means that you can still get on the Internet and access websites and so on with the firewall on, but it will be much more difficult for people to break into your computer and steal information. If you have a PC and are running Windows XP or later, you turn on your firewall by clicking “Start”, then “Run.” Type “firewall.cpl” into the box, and then click “ok.” Then click on the “General” tab and click “on,” then “ok.”

A firewall is just what it sounds like: a wall put up between the software of your computer and the greater world of networked computers. When they’re turned on, firewalls block unauthorized access to your computer while still letting authorized communication through. This means that you can still get on the Internet and access websites and so on with the firewall on, but it will be much more difficult for people to break into your computer and steal information. If you have a PC and are running Windows XP or later, you turn on your firewall by clicking “Start”, then “Run.” Type “firewall.cpl” into the box, and then click “ok.” Then click on the “General” tab and click “on,” then “ok.”

3. Provide Private Information Over HTTPS Connections

You may have noticed that every website address begins with HTTP or HTTPS. HTTP stands for Hypertext Transfer Protocol, and HTTP stands for Hypertext Transfer Protocol Secure.

If a website address begins with HTTPS, that means that the information you’re putting out there is “encrypted,” that is, locked inside a digital package that cannot be readily opened by anyone. It’s analogous to difference between sending a postcard through the mail, which anyone can read, and a letter that is sealed in an opaque envelope.

HTTP websites can be subject to eavesdropping or interception attacks, which is what happens when a third party intercepts that transfer between Person A and Amazon.com.

HTTPS sites, on the other hand, are designed to withstand those attacks and are much more secure than HTTP sites. An HTTPS site will provide a certificate verifying that it has been tested, uses HTTPS protocol and is secure, and that certificate correctly identifies the website.

So, if you’re about to put out personal information on the Internet, look at the web address first. If it is only HTTP, not HTTPS, strongly consider not giving out that information.

4. Don't Use File-Sharing Software

File-sharing software, such as LimeWire, Bit Torrent and Gnutella allow computer users to download music files, expensive software programs and games, usually for little or no cost.

File-sharing software works by connecting your computer to millions of other computers and then allows those computers to share the desired files. Unfortunately, installing a file-sharing program can sometimes expose the private identity information stored on your computer to the millions of other people on this network.

For example, if you have LimeWire and you do your taxes on your computer using a program like Turbo Tax, other people in your LimeWire network might be able to hack into your computer and access your tax information.

If you absolutely must use file-sharing software, make certain to read the End User Licensing Agreement before clicking “I agree” so that you know exactly what you’re getting into. Look for the agreement to contain language such as, “the Software may collect anonymous aggregate information for statistical analysis purposes. However, the Software does NOT collect any personally identifiable information such as a name, an email-address, or a unique ID.”

If the EULA doesn’t contain such language, the software you’re downloading may collect “personally identifiable information,” even information not related to that program, leaving you open to identity theft.


source : http://news.discovery.com/.....By Elizabeth McIntyre

Share/Bookmark

.......................................Fileshare.......................................

Related Posts



No comments: