Differences
This shows you the differences between two versions of the page.
— | laptopwiki:guides:general:security [08/03/2025 17:58] (current) – created - external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Security ====== | ||
+ | |||
+ | A device is just a tool, that is inherently as (un)safe as the user lets it be. | ||
+ | |||
+ | ===== Anti-virus protection ===== | ||
+ | |||
+ | There are multiple options for anti-virus protection. Whether it's some pre-installed useless bloatware from the manufacturer, | ||
+ | Should a user download a program and install it, the anti-virus will assume the user wanted to download and install it. Outside of some preemptive screening that will check for major viruses, after the user approves the installation, | ||
+ | |||
+ | ==== Recommended anti-virus programs ==== | ||
+ | |||
+ | Due to the above mentioned, there is a limit to how useful an anti-virus protection can be. Just like traction control on your vehicle will try to keep you on the road, it won't stop you if you deliberately steer into a tree. Therefor, some anti-virus protection is always good and welcome, but is an aid, not a replacement, | ||
+ | |||
+ | ==== Password security ==== | ||
+ | |||
+ | The most common way a password gets stolen, is by using the same login and password on multiple places. In such case, all it needs is just one place to get compromised, | ||
+ | |||
+ | === 2FA === | ||
+ | |||
+ | Also known as two factor authentication, | ||
+ | Another great benefit of 2FA is that it can also detect a password theft. Should someone try to access your data without your knowledge using stolen credentials, | ||
+ | |||
+ | === Safety tips === | ||
+ | |||
+ | In order to increase your security:\\ | ||
+ | - Don't reuse the same login + password combination on multiple places. Especially not in vital places. **Never under any circumstances reuse the same password as you use for your email or any extremely important data which may give access to your personal data and banking information or credit cards.** Keep those passwords always unique and follow the recommendations of your bank. \\ | ||
+ | - If you store passwords, store them in safe places, and generally avoid storing them in applications you didn't program yourself or have complete control of. If you trust your login with some company, make sure you absolutely trust that company in the first place. If you can't be sure about the company, make sure you are ok with the possibility of a data breach, and that your login, should it get stolen, won't provide any usable information.\\ | ||
+ | - Use 2FA. Always.\\ | ||
+ | - Keep 2FA login/ | ||
+ | |||
+ | ===== Common threats ===== | ||
+ | |||
+ | - User being deceived or making a mistake and downloading an application that was tampered with or was generally unsafe. Can lead to, for example:\\ | ||
+ | --> Stolen identity\\ | ||
+ | --> Stolen banking details and credit card details\\ | ||
+ | --> Theft of credentials, | ||
+ | --> Having a cryptocurrency miner installed, that will eat your resources, slow down your computer, increase the heat generation and your electricity bill\\ | ||
+ | --> Adding your computer to a bot network, that will be used to attack other websites and servers\\ | ||
+ | --> Downloading a virus that is designed to break down your system and cause you issues when you try to use your device | ||
+ | --> Etc. | ||
+ | \\ | ||
+ | - Visiting shady websites\\ | ||
+ | --> For example, websites with pirated software. Pirated software was usually tampered with by the nature of the software piracy, and it's not possible to know in what ways exactly was it modified. Whether just the verification was removed to allowed illegal access to the application, | ||
+ | --> Porn websites. Porn is a common avenue for malware. Beware of shady porn websites. \\ | ||
+ | \\ | ||
+ | - Phishing \\ | ||
+ | --> Usually an email or website pretending to be someone else to obtain your credentials. It can have many forms. One of the most common one is for example pretending to be your bank, and urging you to do some action that involves you using your credentials. You may get an email, that looks like it is from your bank, but the email address of the sender is a tiny bit off even if by only one letter, and the website address looks almost the same, but also has some letter or word different to what your bank uses. The website itself, the graphics and the wording may sound believable, but as always, if you are unsure about your sender, or the website you are visiting, double check it first or contact the company using other, verified channels, about whether they sent you an email. Don't give out your password to anyone who asks you for it just because they did. \\ | ||
+ | \\ | ||
+ | - Using the same credentials and passwords to access different websites or applications. Where data breach of one can lead to compromising all other\\ | ||
+ | - Not using 2FA, which can reveal a password theft. \\ | ||
+ | - Not using 2FA properly, and approving 2FA requests by mistake when you didn't request the 2FA in the first place. **If a thief tries to use your stolen credentials, | ||
+ | |||