• Advertising
  • Disclaimer
  • Copy Right
  • Contact us
  • About us
WTM News
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

With the relaxation of summer, cyber dangers are accentuated: this is how you can protect yourself during the holidays | Your Technology | The country

News writer by News writer
July 7, 2022
in Technology
7 0
A A
0
With the relaxation of summer, cyber dangers are accentuated: this is how you can protect yourself during the holidays |  Your Technology |  The country

With the relaxation of summer cyber dangers are accentuated this

153
SHARES
235
VIEWS
Share on FacebookShare on Twitter

With the relaxation of summer, cyber dangers are accentuated: this is how you can protect yourself during the holidays | Your Technology | The country
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.

He’s been waiting all year for this moment. It’s time to pack your suitcase, take the car and get to the beach. Or to take the plane and visit that country that I wanted to know so much. Whatever your summer plans, chances are you’ll be using your mobile phone for just about anything—from checking a route to uploading beach photos to your Instagram profile to watching a series. You may also end up using a public computer to, for example, do the check in of your return flight. What surely is not part of your plans is to fall into the trap of a cybercriminal who can ruin the long-awaited vacation. According to the cybersecurity technician for citizens of the National Institute of Cybersecurity (INCIBE) Ruth García, “in general, all users lower their guard in summer.” To avoid any bad experience, you can follow these simple tips that will help you avoid risks without spending too much time and effort.

Before the trip, beware of vacation rentals

Ruth García explains that when it comes to rentals during this period, “the excuses that cybercriminals usually use are, for example, that they cannot show the flat because they are abroad. If the user requests something specific that the landlord would not normally accept (such as painting a room), it says yes to everything. If they ask for payments in advance or transfers abroad, we can also find ourselves cheated”.

According to the technique, “there have been situations in which someone who had rented an apartment and, when he arrived at the place, the building or even the street did not exist. It is recommended to search for the address on Google Maps to check if at least the area is urbanized or, even if they have given you the name and surname of the person who is going to rent you, you can also search for information about that person to see if they exist.

It is best to resort to recognized platforms and services to carry out this type of procedure and not to any internet advertisement. Fraud can also occur on these platforms, but at least “you have a little support from that company behind it, in case you have a problem,” explains García. Also, fraudulent listings or profiles on those pages are often removed quickly.

Although it looks great in that photo, think twice about uploading it

In full vacation, it is likely to feel the adrenaline of having a good time and living a moment that has been awaited for months. It is natural that she wants to share it with her friends and acquaintances. However, before uploading the photos you just took to your social networks, you should consider whether they provide too much information. Ruth García explains: “In a photo, not only is the landscape or a dish shown, it often informs whether we are at home or not, if we are accompanied, the lifestyle we lead, if we have a high purchasing power… We already know that Crime tends to increase during vacation periods, taking advantage of the fact that many people are not at home, and the networks can be a very useful information channel for them. Although it may not seem relevant to us, for someone who wants to harm us it can be.” That is why it is also recommended not to share locations or show that you are away from home.

In addition to this type of danger, there may be another related to images: that of regretting, within a certain time, having shared a certain type of photograph. “In these periods we participate in more parties, events, leisure activities… There may be images that we want to upload, being in a bikini, for example, but we have to reflect on whether in two or three years we are going to want it to be on the network because, even if we wanted to remove it, other people could have copied or stored it. There have been cases where certain images have been used to create false profiles and identities. And you don’t have to be a famous person; cybercriminals take advantage of any information uploaded by a normal user to get a profit from it”, insists García.

If possible, avoid connecting to public Wi-Fi networks

Being away from home and, of course, from work, there is the inevitable circumstance of having to resort to mobile data. Although, as the technique explains, more and more people enjoy more complete plans and with a greater number of gigabytes to browse, it is still common for users to run out of them before time or simply want to save them. Many people, “as soon as they see a free connection, they try to connect, without being aware of what it may imply”, warns the technique.

“If we connect to a Wi-Fi network whose configuration and the people who are connected are unknown to us, the risks are exponential. In principle, no one has to be using it for malicious purposes, but this risk can never be ruled out. We recommend connecting to public Wi-Fi networks only in case of extreme need or to carry out actions in which there is no exchange of personal information, not to upload our photos or carry out online procedures such as purchases”, emphasizes Ruth García.

Make backup copies so you don’t lose all the photos you’ve taken

Another of the unavoidable customs of the vacation periods is to photograph practically everything: from the drink in the beach bar to the children jumping between the waves; from the airport terminal to the views from a lookout point. To avoid losing all the images and videos that we take, it is recommended to make backup copies. When you’re not at home, it’s unlikely you’ll be able to transfer all that content to a hard drive, so use the cloud instead. Of course, as the INCIBE technician warns, you should not forget to dump everything to a USB or an external disk when you return home.

Take the opportunity to activate double verification

In recent years, double verification or double authentication factor has become more and more important and more and more platforms and services offer the option to activate them. But what exactly does it consist of? Let’s say you’re about to log in to your email or a social network. Normally, you would only need to provide the access password. Double verification shields access and asks the user to enter a code that normally reaches their mobile phone via SMS, in addition to said password. In this way, even if someone managed to find out the password, they could not access the account, according to the technique.

Since you have free time, change your passwords at once and use a manager

“If someone gets one of our passwords and it turns out that we use it for several services, cybercriminals will have access to all of them,” warns García, who insists: “It is good practice to take advantage of this time to change passwords. To memorize all of them, they can resort to mnemonic rules or simply use a password manager that works with a master password and, therefore, they only have to memorize that one”.

There are several free password managers you can use that will allow you to have very difficult random passwords without having to remember them. If you add to that the previous step, double verification, you could say that you have done everything in your power to protect your data and your devices.

As always, be careful with SMS

Although it is not something exclusive to this era, in recent times the number of frauds related to SMS messages has increased considerably. “There has been an increase in cases of impersonation of banking entities by SMS (a crime known as smishing), with many users affected and a great impact. Banks are alerting customers, but you have to be very careful. In case of any doubt about the legitimacy of the message, go to the official channels and even directly to a branch”, advises Ruth García, who also recalls that INCIBE has a free help line 017 for users who need information or guidance with any problem.

Cybercriminals are impersonating companies with fraudulent SMS of alleged account anomalies, access attempts, refund of amounts… with a clickable link. From BBVA we will never send you SMS with links, nor will we ask you for passwords or personal data.

— BBVA in Spain (@BBVA_espana) June 29, 2022

Attention to QR codes

Since the beginning of the pandemic, in order to reduce contacts between users, many companies began to opt for QR codes so that restaurant customers, for example, could consult the menu from their own mobile phone or so that visitors to a museum could access a program. Cybercriminals began to supplant those codes; sometimes with techniques as crude as sticking a sticker on top of the real code. For this reason, it is recommended to be suspicious if the website accessed when scanning the code asks the user to download, if it asks for personal data, or if it seems that a file is being executed on the device.

Although all this depends on what the user expects when scanning it. In other words, it would not make sense to download to access a restaurant menu, but perhaps it would make sense to use an application from a cultural center. The user must assess it according to common sense and, when in doubt, not provide data or allow such downloads.

You can follow THE COUNTRY TECHNOLOGY in Facebook Y Twitter or sign up here to receive our weekly newsletter.

Source: elpais.com

Tags: accentuatedcountrycyberDangersholidaysprotectrelaxationsummerTechnology
Previous Post

UK: Boris Johnson: the end of the Brexit wizard’s getaway | International

Next Post

3 ideas for the future of ‘Stranger Things’

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

profesiones tecnológicas tecnología circular
Technology

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology
Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Roberto Lopez Familia Martínez
Technology

Interview with Roberto López, Corporate CTO Familia Martínez

November 23, 2022
Cloudera Data Platform One
Technology

Cloudera Data Platform One, accessible data analytics

November 22, 2022
Cloud services to solve complex IT problems
Technology

SAP deploys the first public cloud project at Cepsa

November 22, 2022
appian world data fabric
Technology

Appian joins the Low-Code Data Fabric

November 22, 2022
Next Post
3 ideas for the future of 'Stranger Things'

3 ideas for the future of 'Stranger Things'

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
'Stranger Things': Jamie Campbell Bower opens up about her secret role for the first time

‘Stranger Things’: Jamie Campbell Bower opens up about her secret role for the first time

May 31, 2022
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

July 25, 2021
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

July 24, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Latest News

At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

Marze Safar

Food Cake

Arabic news

BackPack Travel

Travel Vision

Cooking

Drinks & Foods

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star | News Pro | Arabic news

Buy sponsor post | Marze Safar | BackPack Travel | Food Cake

How to cook any thinks | Learning how to make cakes and sweets

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist