Cyber Security Basics
The notorious scandals as well as unfortunate personal experience induced people in a constant state of doubt when it comes of revealing private data on the internet. This is in fact one of the main business tricks of the media who would question the security and basic conditions of various companies in order to find the best story and launch a real craze among the public. Professionals however stick to their intention to provide us with the latest and top five cyber security myths that though can be easily busted would still cause some moral and also financial damages to people. These would also reveal some of the most well-known tricks cyber criminals use to convince people to offer their personal information. Though some of the might seem familiar for the majority of frequent internet and social network users, however some were also kept in secret for a long time and were revealed just recently. Enrich your knowledge of security especially if you are a real rookie in this domain.
Cyber Security Myths
Myth No.1: Having Firewall Equals Safety
Myth No.2.: An E-mail From a Friend is Safe
Hackers as well as potential criminals often use the ‘address’ list in order to send spams as well as attacks that can weaken and in more severe cases destroy our computer. Those who are specialized in security issues are aware of the fact that e-mails can come from endless sources that are either traceable or completely untraceable. Therefore think about getting letter from people you don’t know or senders you didn’t contacted. Keep away of opening these especially if you have experiences similar disasters. Often the tragedy can’t be avoided since most of the skilled hackers are aware that disguising themselves in relatives and friends is the ultimate solution to invade one’s privacy.
Myth No.3: Links From Twitter and Facebook are Safe
It is a common misconception that the link provided by friends on social networking sites is safe and secure. However with the development of technology hackers and attackers also specialized in targeting these centers of users that often suggest security and people tend to reveal their personal information. Hiding behind the mask of a friend can be the best means to send spams as well as scams. With the use of XXS or cross-site scripting these criminals copycat the applications creating the alter ego of your favorite Facebook or Twitter site.jp
Myth No.4: Hackers Target Financial Transaction
Myth No.5: Messages are Safe, Attachments are Dangerous