laptopwiki:guides:general:security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
laptopwiki:guides:general:security [24/05/2023 12:53] – created m164laptopwiki:guides:general:security [24/05/2023 13:04] (current) m164
Line 32: Line 32:
  
 - User being deceived or making a mistake and downloading an application that was tampered with or was generally unsafe. Can lead to, for example:\\ - User being deceived or making a mistake and downloading an application that was tampered with or was generally unsafe. Can lead to, for example:\\
--- Stolen identity\\ +--Stolen identity\\ 
--- Stolen banking details and credit card details\\ +--Stolen banking details and credit card details\\ 
--- Theft of credentials, that will be used to access your data across multiple websites, applications, etc.\\ +--Theft of credentials, that will be used to access your data across multiple websites, applications, etc.\\ 
--- Having a cryptocurrency miner installed, that will eat your resources, slow down your computer, increase the heat generation and your electricity bill\\ +--Having a cryptocurrency miner installed, that will eat your resources, slow down your computer, increase the heat generation and your electricity bill\\ 
--- Adding your computer to a bot network, that will be used to attack other websites and servers\\+--Adding your computer to a bot network, that will be used to attack other websites and servers\\ 
 +--> Downloading a virus that is designed to break down your system and cause you issues when you try to use your device 
 +--> Etc.  
 +\\
 - Visiting shady websites\\ - Visiting shady websites\\
-- Using same credentials and passwords to access different websites or applications. Where data breach of one can lead to compromising all other\\+--> For example, websites with pirated software. Pirated software was usually tampered with by the nature of the software piracy, and it's not possible to know in what ways exactly was it modified. Whether just the verification was removed to allowed illegal access to the application, or some other modifications were made \\ 
 +--> Porn websites. Porn is a common avenue for malware. Beware of shady porn websites. \\ 
 +\\ 
 +- Phishing \\ 
 +--> Usually an email or website pretending to be someone else to obtain your credentials. It can have many forms. One of the most common one is for example pretending to be your bank, and urging you to do some action that involves you using your credentials. You may get an email, that looks like it is from your bank, but the email address of the sender is a tiny bit off even if by only one letter, and the website address looks almost the same, but also has some letter or word different to what your bank uses. The website itself, the graphics and the wording may sound believable, but as always, if you are unsure about your sender, or the website you are visiting, double check it first or contact the company using other, verified channels, about whether they sent you an email. Don't give out your password to anyone who asks you for it just because they did. \\ 
 +\\ 
 +- Using the same credentials and passwords to access different websites or applications. Where data breach of one can lead to compromising all other\\
 - Not using 2FA, which can reveal a password theft. \\ - Not using 2FA, which can reveal a password theft. \\
 - Not using 2FA properly, and approving 2FA requests by mistake when you didn't request the 2FA in the first place. **If a thief tries to use your stolen credentials, and you get a 2FA notification, don't approve it.** You think this may not be needed to be mentioned, you would be surprised how common it is that unsuspecting victim approves the access of the thief. - Not using 2FA properly, and approving 2FA requests by mistake when you didn't request the 2FA in the first place. **If a thief tries to use your stolen credentials, and you get a 2FA notification, don't approve it.** You think this may not be needed to be mentioned, you would be surprised how common it is that unsuspecting victim approves the access of the thief.
  
  
  • laptopwiki/guides/general/security.1684925584.txt.gz
  • Last modified: 24/05/2023 12:53
  • by m164