WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

10 TIPS TO INCREASE CYBER SECURITY

We must abandon the idea that our personal information and devices do not interest anyone, because they are valuable.

cybersecurity
Okay, for a cybercriminal, it will be more sweet to access information from a financial institution than to access your accounts. But it turns out that the first is complicated and expensive, while the second is not so much. And, on top of that, it can be replicated thousands, millions of times in an automated way.

It is essential to understand this.

Protecting yourself from information or money theft is easier than you think.

Here Are 10 Tips To Increase Your Cybersecurity:

1 Use More Than One Method of Accessing Important Websites

We are simply facing the most comfortable security system to implement and that to make matters worse, it ensures our life online.

You may have heard of the second factor of authentication or 2FA. In addition to username and password, to access sensitive sites you have to enter a code generated by an application on your mobile. This code is renewed every minute.

To fraudulently access our bank accounts, email or social networks, in addition to obtaining the username / password, they will have to physically steal our mobile.

If you don't already have it active in your accounts, I don't know what you're waiting for.

2 Use a Password Manager

Different accounts, different passwords. Use strong passwords, which is nothing more than including uppercase, lowercase, numbers, and symbols like # or =.

But of course remembering long and random passwords is impossible.

Also, having them saved in a file or in the browser is very insecure, the solution is to work with a password manager, where you only have to remember the master password to access a trunk where you have all the encrypted passwords.

Changing the password every X time is not a measure that adds security so look for a good password manager such as cyber protector.

3 Protect the router, the gateway to your connection

The router, like any other smart device (yes, most routers that we have at home have their own operating system) is permanently connected to the Internet.

Today it is a primary target of the cybercrime industry. For very different uses, in fact.

The router in our home, and ultimately, the rest of the routers we usually connect to (the one at our friends and family's home, the one at the office, the one at the cafeteria where you go every morning, the one at transport public) are the main access door to our devices.

And just like at home you don't leave the door open, you shouldn't do the same with digital.

The priority is to change the username and password to access the router's administration page that comes by default.

These credentials are publicly known (a quick Google search tells you what username and password each router model has by default), and it is the first thing any automated attack tests.

Second, change the password to access the Wi-Fi: As with the access credentials to the administration page, each router usually has a series of default passwords to access the Wi-Fi.

Changing them to any other will prevent applications that track routers with unmodified passwords from being able to access yours.

Finally, use a password WPA2 and higher, so that at least brute force attacks do not work.

4 Use A VPN

VPN tools, or Virtual Private Network for its acronym, are nothing more than systems that make sure that everything you send or receive from the moment it leaves your computer until it reaches the server and vice versa is sent safely.

Therefore, we avoid one of the risks that people most commonly run outside the home: connecting to little or no security on public networks such as those found in public transport, in hotels and in coffee shops.

It is a highly recommended tool for all of those who usually connect to public networks, and therefore insecure.

You simply enter your VPN tool, click to connect, and from then on everything you send and receive will be protected by encrypted travel.

5 Internet is not the bar counter

Be careful with the information you post on social networks.

Everything. Absolutely everything you say on the Internet, leaves a mark.

What about the publications that adolescents post today when, after 5 years, they enter a selection process for a job?

A lot of personal information can be obtained on your social networks to be used to deceive you and obtain access data to sensitive sites. Even to request duplicates of your SIM card.

It's called social engineering, and cybercriminals use it more and more as we are very generous with our personal data.

6 Be Careful What You Install

Common sense and prudence.

Think twice if the application that you are going to install on your computer you really need.

Also check that the applications that you have installed on your computer, tablet and mobile are using them, otherwise it is better to uninstall.

Take into account the permissions that you give to each application that you are going to install.

With special attention to those applications that want to have access to your contacts, access to your social networks or your camera.

What by the way you should always have a webcam cover covered, a sticker go 🙂

7 Email And Threat # 1

Email continues to be a weak point for cybersecurity, the main threat of which is the phishing attack.

As a basic rule, you should never open an email from a suspicious or unknown sender, much less download or "open" content from an email whose address we do not know.

Phishing is the technique of deceiving a user by impersonating the identity of, for example, a bank or the tax agency, to obtain personal data, credit cards or bank details, among others.

By default, be wary of any alarmist email that requires you to click on a web link, especially those that urge you to do so. We must also be suspicious of all unknown or unexpected senders and not trust unknown attachments.

The first and perhaps most important thing is common sense.

In addition to not clicking on any links, neither in text mode nor in images or audio files, check the sender's address.

An important entity will never send you an email from @hotmail or @gmail.

8 A good antivirus, updated.

Yes on mobile too.

Look for a good antivirus that has a version for your web browser.

Schedule periodic scans.

9 Treat Your Mobile Like A Computer Because It Is.

Nothing to leave the mobile to the children. And if they are going to use the family computer always in view of you.

The increasing use of mobile devices means that cybersecurity threats are growing.

Scams like "sim swapping" or theft of the mobile SIM card will be more and more common.

Keep your device updated, with an antivirus, browsing with a VPN and being careful what you install.

10 Update, Update And Update

When everything works fine, it's very easy to forget about system and program updates. But it's a bad idea, as you still have to worry about the third main reason to upgrade: security.

Keeping the system up to date solves security problems and adds defenses against the latest known attack techniques.

Updates are especially important for devices such as smart televisions, a gateway to our personal data that, due to its novelty, we do not have much control.

Check that all devices with an internet connection have their operating system updated. Then remember to update Antivirus and browsers.

Of course, make sure that you only download all the updates from the official website of the developer.

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS