Teach you how to prevent the top ten threats to network security (2)

  

When you dial this number, the voice menu will prompt you to enter your card number before transferring to the customer representative. Phishing attackers will also ask you to enter some other data, such as credit card expiration dates.

Precautions: For online credit card fraud, some bank websites support the use of one-time credit card numbers. You can also create an account with a lower credit limit to minimize losses. In addition, you can also consider using the digital security certificate provided by the bank to maximize the security of your account.

For VoIP phishing attacks, you must not make business contacts based on the phone number provided by the unknown email, but instead call the phone number printed on the back of the credit card.

Fourth, social network security threats

Some of your friends send information to you through social networking sites, and this information is generally more funny or you have never heard of before. When you click on the information link, you will find that the page has entered a phishing website and steal your login information or take advantage of the system to infect your system.



In fact, your friend did not send you a message. These cybersecurity threats are exploiting the psychology of users and launching attacks.

Precautions: If you find that your design network account may be under attack, please contact the website support department. Change your password regularly and try to avoid clicking on any links in the unknown email and links to social networking sites, and develop a good habit of entering the domain name in the browser address bar.

V. Mobile phone data leakage

Although it is not as common and serious as laptop data leakage, mobile phone data leakage can not be ignored. Many users often ignore some important data in old mobile phones when updating their mobile phones, such as email addresses and phone numbers, call records and short messages. Although they may not contain financial data sheets, they also involve To the privacy of the parties.



Precautions: Before you abandon your old phone, remember to reset your smartphone. It usually takes five minutes to reset the default state. You can use it to reset the code or operate according to menu options.

six zero-day attacks
no matter how diligently you patch the system and protect your computer, it is still possible to move in within a few hours after the attack to unforeseen occurs. I have encountered this because you have been the victim of a zero-day attack. This kind of attack is often directed at a software vulnerability. When the vulnerability was discovered, no patch files were released and known issues were made. When it was fixed, the hacker launched an attack.



Now, the value of zero-day attacks for online criminals is skyrocketing because they can invade the latest, well-protected systems.

Precautions: Windows Automatic Updates will install all the patches you need. However, the automatic update that comes with the system is generally slow. It is recommended to keep an eye on the latest security information and technology trends during the period of discovering system vulnerabilities and installing patches. In addition, there is no particularly effective technical means to avoid such attacks.

VII. Malware

Malware includes a variety of rogue fraud software and counterfeit security software. Some online advertisements that mimic Windows alert messages will feature information promoting DriveCleaner, WinFixer, Antivirus XP, and Antivirus 2009 products that warn you that your computer is infected with malware and recommends that you purchase these security products as soon as possible.

Even some rogue software will embed it directly on the Windows desktop or pop up the above information from the system tray to illustrate the seriousness of the problem.



However, these threats are just pretending to scan your system for malware. They can’t find out if the system is really infected with malware, but disable Windows. Some important components such as the Registry Editor or Task Manager. Or disable the option to display the property settings of the operating system to prevent you from terminating or deleting fake security prompts.

It is worth noting that users are particularly vulnerable to falling into this trap because the cost of a hacker is not high.




Copyright © Windows knowledge All Rights Reserved