kmiainfo: In order not to become easy prey for thieves How to protect your money online? In order not to become easy prey for thieves How to protect your money online?

In order not to become easy prey for thieves How to protect your money online?

In order not to become easy prey for thieves How to protect your money online? A computer programmer or hacker prints a code on a laptop keyboard to break into a secret organization system.  In this report, published by the American "CNBC" website, Matt Mueller, Director of Security Operations at Coinbase, Matt Mueller, presented 6 basic steps that you must take to protect your money and personal data against hackers.  Use password apps Most people tend to reuse the same password, because many don't have the time to create unique and strong passwords as often as the need arises, or are afraid to forget them. Unfortunately, hackers are aware of this. Even worse, many people choose a simple password which makes it easier for phishers to guess the correct login code across multiple accounts.  In this case, the author recommends apps like 1Password, Dashlane, and LastPass, which create unique and strong passwords for your online accounts and protect them with multiple layers of encryption.  Most of these apps encrypt your passwords automatically when you visit websites, which helps protect you from phishing or accidentally sharing your password in the wrong place.  Enable Two-Factor Authentication (2FA) on every available site Two-factor authentication (2FA) requires not only your password, but a random code to prove your identity, which adds another layer of security and requires hackers to try to guess both your password and code at the same time. And while sending a two-factor authentication code via a text message to your phone is the most common option, it's not the most powerful.  If the hacker somehow gained access to your phone, they would be able to read your text messages and thus gain access to your two-factor authentication codes.  To avoid this, the author recommends using stronger forms of two-factor authentication, including external device security keys such as Yubiki or Google's two-factor authentication tools such as Google Authenticator.  Less attack on you When security professionals talk about the "attack surface", they mean all the places where programs run.  Running 150 apps or browsers is more likely to expose you to vulnerabilities than if you were running 10 apps. So, see if you can get rid of any software you no longer use, and check the sources of any new apps or software you install.  Protect your keys The “private key” gives access to the wallet in which your cryptocurrency is stored, and it is your key to interaction via the “blockchain”, meaning that anyone who knows your private key can access your wallet.  To ensure that your keys do not fall into the wrong hands, you can use the services of a crypto exchange with a strong security history to manage those keys or an electronic wallet such as Trezor Wallet and Ledger which are designed to protect your cryptocurrency.  These wallets give you an extra layer of security by storing your private keys offline, away from hackers trying to steal your money if you are online. These wallets are often a small auxiliary device that plugs in in case you need to access your keys.  Beware of scam calls, texts and emails With many people resorting to remote work during the COVID-19 pandemic, there has been a noticeable increase in cyber intrusions.  Hackers often ask you to download a program or contact you claiming that there is a security issue with your computer or your financial accounts. These hackers may claim to be connected by Apple, Microsoft, Google, or your financial institution.  Then, they'll ask you to download some kind of desktop software that gives them complete control of your computer, allowing them to log into your financial accounts and make transactions.  Don't fall into the tactics of exaggerated urgency One of the things that characterizes most online scams is that they get the victim to act instantly without thinking. For example, you may receive a message saying “Cryptocurrency withdrawal requested from an unknown IP address. If it is not you, click here”. But if you click on the link, your account will be hacked. And if you're suspicious of a particular link source, go directly to the website yourself from a trusted browser.  The writer cautioned that if something sounds too good to be true, it could potentially be a trap. It is common for hackers to offer false promises or unrealistic incentives, such as promising to double your money guaranteed.  Source : CNBC

A computer programmer or hacker prints a code on a laptop keyboard to break into a secret organization system.

In this report, published by the American "CNBC" website, Matt Mueller, Director of Security Operations at Coinbase, Matt Mueller, presented 6 basic steps that you must take to protect your money and personal data against hackers.

Use password apps
Most people tend to reuse the same password, because many don't have the time to create unique and strong passwords as often as the need arises, or are afraid to forget them. Unfortunately, hackers are aware of this. Even worse, many people choose a simple password which makes it easier for phishers to guess the correct login code across multiple accounts.

In this case, the author recommends apps like 1Password, Dashlane, and LastPass, which create unique and strong passwords for your online accounts and protect them with multiple layers of encryption.

Most of these apps encrypt your passwords automatically when you visit websites, which helps protect you from phishing or accidentally sharing your password in the wrong place.

Enable Two-Factor Authentication (2FA) on every available site
Two-factor authentication (2FA) requires not only your password, but a random code to prove your identity, which adds another layer of security and requires hackers to try to guess both your password and code at the same time. And while sending a two-factor authentication code via a text message to your phone is the most common option, it's not the most powerful.

If the hacker somehow gained access to your phone, they would be able to read your text messages and thus gain access to your two-factor authentication codes.

To avoid this, the author recommends using stronger forms of two-factor authentication, including external device security keys such as Yubiki or Google's two-factor authentication tools such as Google Authenticator.

Less attack on you
When security professionals talk about the "attack surface", they mean all the places where programs run.

Running 150 apps or browsers is more likely to expose you to vulnerabilities than if you were running 10 apps. So, see if you can get rid of any software you no longer use, and check the sources of any new apps or software you install.

Protect your keys
The “private key” gives access to the wallet in which your cryptocurrency is stored, and it is your key to interaction via the “blockchain”, meaning that anyone who knows your private key can access your wallet.

To ensure that your keys do not fall into the wrong hands, you can use the services of a crypto exchange with a strong security history to manage those keys or an electronic wallet such as Trezor Wallet and Ledger which are designed to protect your cryptocurrency.

These wallets give you an extra layer of security by storing your private keys offline, away from hackers trying to steal your money if you are online. These wallets are often a small auxiliary device that plugs in in case you need to access your keys.

Beware of scam calls, texts and emails
With many people resorting to remote work during the COVID-19 pandemic, there has been a noticeable increase in cyber intrusions.

Hackers often ask you to download a program or contact you claiming that there is a security issue with your computer or your financial accounts. These hackers may claim to be connected by Apple, Microsoft, Google, or your financial institution.

Then, they'll ask you to download some kind of desktop software that gives them complete control of your computer, allowing them to log into your financial accounts and make transactions.

Don't fall into the tactics of exaggerated urgency
One of the things that characterizes most online scams is that they get the victim to act instantly without thinking. For example, you may receive a message saying “Cryptocurrency withdrawal requested from an unknown IP address. If it is not you, click here”. But if you click on the link, your account will be hacked. And if you're suspicious of a particular link source, go directly to the website yourself from a trusted browser.

The writer cautioned that if something sounds too good to be true, it could potentially be a trap. It is common for hackers to offer false promises or unrealistic incentives, such as promising to double your money guaranteed.

Source : CNBC

Post a Comment

Previous Post Next Post