6 myths about Internet security, the belief that could be costly
Technologies / / December 19, 2019
If you think you can hack the computer only IT-genius, you are wrong.
1. Firewalls protect the network fully
Firewalls, or firewalls, filter network traffic and protects the internal network from unauthorized access. Firewalls can be divided into two types: hardware and software. The router in your home - the hardware, and the firewall built into the Windows, - software.
Sounds like a firewall presence alone makes the internal network secure, but it's not always the case. Many do not even update the firmware in the router. While these updates may include security patches, closing the vulnerability.
Several years ago, a worm called The Moon Linksys routers are infected. Fortunately, the manufacturer has released a firmware update that failed to stop malicious software.
WPS protocol (Wi-Fi Protected Setup) - another well-known vulnerability of many routers. So far, no one has figured out how to eliminate it. Manufacturers are advised to simply disable this option in the router settings.
Smart move would be to check the reliability of its firewall using
ShieldsUP GRC. And, you can buy an industrial router. These routers are much more expensive, but more likely to receive updates and do not have WPS or options UPnP (universal set of protocols for the configuration of network devices).5 reliable firewall to protect your computer →
2. Anti-Virus will be enough
Most antivirus programs adequately protect your computer from viruses. However, they can not cope with a variety of other types of malicious software: Trojans, spyware, worms, rootkits, keyloggers, or Viruses extortionists.
In Windows operating system has built-in protector to pump over much lately. But do not be naive, you still need a third-party antivirus software.
10 best free antivirus →
3. Hack a PC only can professionals
In movies and games hackers like the evil geniuses who are able to perform hundreds of mathematical calculations per second. They usually hide in underground dens or hide under the hood in coffee shops. In reality, things are not so romantic and cool.
Your computer can crack and ninth-grader from next door. This hacker - script kiddies - just need a code and programs written by other people. One of them is called Autosploil and it is designed to detect and automatically exploits of known vulnerabilities.
4. Passwords - reliable protection
Passwords remain the cornerstone of Internet security. They protect your account against all types of attacks. However, due to the large companies errors credentials of users fall into open access. Because of this even created a special problem site and expansionThat test is not whether utok your password in the Network.
To protect your account, create a strong password, and do not forget to change it from time to time.
How to create and remember a secure password →
If you do not believe in their strength, set the password manager.
10 of the best password managers version Layfhakera →
Use two-factor authentication. To do this you will need an additional device, usually a smartphone.
How to set up two-factor authentication for all of your accounts →
5. VPN - the key to anonymity
VPN idea is to encrypt outbound traffic. As a result, the user can save and protect the confidentiality of data from hacker attacks. But not all so simple.
Recently, Cisco warnedCisco Warns The World Of Super Dangerous VPN Bug: Here's What It Does a VPN bug that affects the work of the popular Adaptive Security Appliance Software. With this vulnerability, hackers can reboot the system or take it over complete control.
VPN help bypass filtering sites and protect data when connected to a public-point Wi-Fi.
But to completely hide user activity or to avoid other types of attacks are unlikely to succeed.
Remember that access to information through the VPN can be in the case of IP or DNS leaks. In addition, VPN data can decrypt the Govt.
What is a VPN →
6. HTTPS is always protected
HTTP (Hyper Text Transfer Protocol) - data transfer method between the Internet and your browser. His kind is HTTPS (Hyper Text Transfer Protocol Secure), through which all traffic is encrypted. Typically, such a method is used by banking sites, online stores and other sites that need extra protection.
More and more sites are moving to HTTPS. However, this does not mean that this method is absolutely safe. A few years ago there was a vulnerability Logjam. Thanks to it, hackers can intercept and view the data in an encrypted connection, and then modify them and carry out attacks man-in-the-middle.
Many sites have successfully bypassed this vulnerability using a 2048-bit encryption key instead of 512-bit.
If you doubt the safety, check the web page with the help of service Host-tracker.
Hackers always a response to another security patch. In this war can be won only if we take responsibility into their own hands.
This does not mean that you need to spend the entire salary on expensive equipment. First, make sure that your accounts are protected by a secure password, and worth the latest firmware on the router.
see also
- What is the theft of digital identity and how to protect your data on the Internet
- How to protect children on the Internet
- How to distribute the internet from a computer via cable or Wi-Fi