
Internet Frauds Scams and Cyber Attacks
- WORLD internet users
DIGITAL AGE –INTRANET TECHNOLOGIES AND WWW Concepts.
- Are you a Techie
- Computer literate
Understand the WWW or indeed Hacking METHODS that can leave your Bank account Empty and you PULLING OUT YOUR HAIR WITH WORRIES THEREAFTER!
Perhaps Trading Cryptocurrencies with a ”wallet” that protects your hard earn trading bitcoin or Ethereum coins Digital funds?
Perhaps even the Shaky Stock market
From My Technical Experiences, none of it is really secure, the powers that be rant on about protecting what you have with them, Banks, insurance companies, stock exchanges, and crypto platforms.
Security is hugely underrated in some cases but most overrated in the bigger schemes of things, the big companies have measures we don’t even begin to understand, however, they are all open to attack by Shrewd hackers, opportunists, and unwanted prying eyes.
CYBERCRIMES UP-TREND 2020
- Trends in cyber crimes for 2020
My Recent Scam Attack 2020
- email hacking
Recently I was almost fooled Duped into following what looked like a legitimate email from HMRC UK
I was tired and worked late into the night after a grueling day out and about with annoying clients.
I wanted to conclude what I started a few days earlier with my inquiries on pension and claims in this area, reading the email I quickly launched the link [though I did check the page and information therein I was convinced all was OK.
Upon accessing HMRC SITE I started to log-in but decided to impulsively as I am sometimes gone back and review the letter I received, fortunately, that was what brought my attention to the header again, something clicked and I decided to check the email it was sent from, WALLA!
There in was the ‘sender’s email collapsed’ not to be seen naturally [he had obviously intercepted my initial inquiry email to HMRC and used the same channel to continue back to me.
Happily, the sender’s address was available under deeper checks. I have reported to the outlook email system and HMRC accordingly
TECHNOLOGIES AND PROGRESS
Don’t get me wrong, everyone is continuously trying to improve, but the bottom line is simple, the very same tech brains are the ones that are applying their silent skills.
GOV-UK AND USA RAISE JOINT ALERTS
Covid-19-styled phishing attacks are now so pervasive that U.S. and U.K. issued a joint warning on what can be called ”internet pandemic” possibilities
News Notable ‘Historic’ Hackings
GOV-UK AND USA RAISE JOINT ALERTS
Covid-19-styled phishing attacks are now so pervasive that U.S. and U.K. issued a joint warning on what can be called ”internet pandemic” possibilities
News Notable ‘Historic’ Hackings
Many have attacked the US government computers, Like it or not the internet is like Our Galaxy perhaps more like a wormhole, Unknown and still unraveling its secrets.
GENERAL INTERNET UNDERSTANDING
Most of us Joe’s and Mary’s, are not even skimming the basics or understanding the wider concept or picture of computers the ethers, and internet security, not everyone is technically minded I understand, so where does that leave us?
Well at the guidance of those that do or simply research each time you want to find out a specific issue you encountered on your device search engines Namely:
- Yahoo
- Bing
- Cnet
- Sargent Geek
- Wiki and similar informational sites
MARKET PRODUCTS: SECURITY PACKAGES:
To name a few top sellers and performance offerings
- Bullguard 3 Devices
- Kaspersky 1 device
- Norton 3 devices
- McAfee 1 device
- Panda Dome 1 Device
- AVG 1 device
- Great market packages
The market is however flooded with hundreds of this software for firewall, Malware, Data Security Protection of our precious personal and private information.
Prevention is the Safest Defence: My Recommended Routine Checks
Some simple daily or weekly tips to purge, clean, and defend your systems, help yourself in keeping the Creeps at bay
I Apply These Simple yet effective practices in my everyday approach working from my computer, mobile, and other devices, it so far has proved effective [touch wood].
DO’s and DON’TS
- Keeping password on your computer desktops
- Leaving emails open and on the inbox
- Starting a transaction perhaps buying a product or service payment but not using Browser Incognito Mode
- Running malware prior to starting your financial activity.
- Confirm webcam is not lit [on] as hackers can access and watch your movements
- Using some shared application with fiends that make your computer accessible via Bluetooth, share, or similar app or software like TeamViewer
In any case, having someone access your computer [even a repair shop] must be regarded as giving access in all its forms. Any important info must be regularly backed up even removed To:
- Portable hard drive
- USB or micro SD card, this will reduce your risk factor of being taken for an unwanted ride
I personally would not advise a network drive Backup [It is a visible resource to those that have the skills to intercept and gain access]
What I have Done for You is provided some guidance Above, However below are some Resources that will safeguard your property and relatively inexpensive to achieve peace of mind
A VPN PRIMARY PURPOSE
Effective but expensive long term, especially if you have family, 3 or 4 computers and devices all concurrently online, this can increase your outgoings financially, Even slow down the access point
VPN’s do have a big role to play as it was for companies and government bodies in the beginning, however, made public domain and hence saboteurs, hackers see it as an easy to inflict problems on society and governments
What is a VPN
ACT AS VIRTUAL PRIVATE NETWORKS ”TUNNEL” SIMPLY CONNECTING YOU TO A TARGET WITHOUT USING THE USUAL NETWORK SYSTEM AVAILABLE
Compare it to a Bullet train that only stops at the destination end.
Unusual Network services allow less security, Where your IP, Domain name server [DNS], and or activities can be monitored or tracked to use against you.
One I currently use in China after years of problems has held strong, funnily enough also by word of mouth recommendation, not believing I would find any better I decided to give it a try. amazingly it works effectively for over 4+ years now
Expressvpn has the support and rapid service to fix any reported issues I have just by sending a message from within the app itself not stupid emailing just a short note and it automatically attaches a snapshot of your connection status and connectivity issues.
Home Internet Annoyances: How to Fix
~The beauty of a home network is that it can make life so easy–what could be better than sharing an Internet connection so that everyone can be online at the same time?
With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house
Cyber Security Hacking
Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking.
Learn How to Manage Cyber Risks Using Defense Strategies and Penetration Testing for Information Systems Security Paperback
VERY RECENT NEWS
Technical Researchers have discovered an advanced type of malware capable of Circumventing strict security platforms.
Company Cybersecurity ‘ESET’, This Ramsay malware seems devised to specifically infiltrate
”Air-Gapped Devices and Networks”
Before this was an impossible task to breach.
The Agenda is such, that once a device was infected, the malware is said to attack adapt [scrapes] Word, PDF and ZIP files, and other sensitive information.
It lays dormant to be activated at any given time written by the programmer when triggered transport [export of your data commences leaving a system utterly opened.
Summary
We are constantly on the knife-edge protect the things we worked hard to attain in life
This fact that someone can actually have the compulsion to steal, scam, or hack our privacy is nothing short of an attack and intrusion of privacy and personal space
A serious criminal offense that deserves all That the law can level at them.
Christopher
Hi Welcome Passionate and Article-blog writer Born Latin America, Grew up predominantly in the UK World traveler countries but none inspired me to take on the writing scene. until Asia. My goal is in utilizing both new and acquired experiences. This site is designed to bring a grounded walk of life in what and where i have resided, worked or loved in some cases all consequitively. No Fancy talk and Promises just plain experinces, life is about tribulations and this is no different, quality in its contents and what it offers is what you will inevitably read digest and consider. My natural drive meeting and greeting organically, is about life and its cultures, different circumstances I encountered in this carbon body and its grace on this earth. To complete a book of experiences is a plan,, Honest and relevant testimonials beginings to where i am now. Feedback from you Comments is all i request, Tell me what niggles, frustrates or pleases you. If you want a topic covered Fine! That too! Have a Positive Life Chris
This is a very interesting article, especially for someone like me that loves using a computer for basic needs, but has no idea about how to protect my computer and myself.
I had always heard of VPN but never knew what that was so thank you for explaining that to me.
When you say to not keep your passwords on your computer, do you mean to not have them saved? Many sites that I used, automatically sign me in when I am using my computer because it recognizes me, and that is my own fault because I ask it to save my settings. I guess I feel safe because my computer never leaves home, but can someone hack from else where because I saved my username and password?
Thank you for a great post.
Cynthia
happy to see you here, yes we all face technology at sometime or another and the more we learn the less it seems we understand, lol
About password savers on browsers, this never a good thing, but i understand it saves time and remember passwords, but there things like dashlane [encrypted saver] i think maybe 90% of people d as you do just save as we are requested by browsers to do.
its safe enough but not ideal.
what i was more related to is writing them down on paper, because scammers can open your webcam and view you as you work., though upside down they have software to snapshot and rotate?
also speaking out loud passwords as we enter is another revealing aspect [and i have done that my self]
i woudl also look at your firewall, many software like AVIRA, PANDA SECURITY, AVAST ARE GOOD and some offer firewall free
all these you can get free its public domain.
Be safe and try any see what i mean
quite an intriguing blog you have here and you did an amazing job writing on and I must say you did an amazing job making out time to write such an amazing post which really has a lot of information on it regarding the setbacks that the currently pandemic has brought to the world I hope we overcome it soon enough..
thanks for sharing such an amazing post which contains a lot of facts needed
Evans
great to hear from you and your opinions are well received, yes its a tough post to research but very interesting to get my teeth into,
I am happy to hear you find it of value and good reading
regards
chris
Hey nice article you have there. Thanks for sharing such a timely information. Fraudulent activities in the internet has been on the increase in recent times, hackers have developed several means/methods that looks appealing to hijack personal credentials or information from individual with the intent of defrauding them, the ability to know how they work and operate is very Paramount to save one a fortune